, 0x34, 0x0) r7 = getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getuid() r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r11, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r11, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r14, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r16) r17 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000880)={0x350, 0x0, 0x8, [{{0x2, 0x2, 0x6, 0x6, 0x8001, 0xa0, {0x4, 0x5, 0x8, 0x4, 0xffff, 0xfffffffffffffff8, 0x3ff, 0x80, 0x4, 0x10000, 0x55f, r4, r6, 0x4, 0xffff}}, {0x4, 0x6, 0x5, 0x7, 'syz0\x00'}}, {{0x6, 0x2, 0x1, 0x100000001, 0xffffff80, 0x688e, {0x5, 0x7, 0xfff, 0x96, 0x3, 0xfffffffffffffffe, 0x401, 0xe2, 0x9, 0x6, 0x1, r7, r8, 0x4, 0x1}}, {0x6, 0x3, 0x8, 0x8, 'ip6gre0\x00'}}, {{0x5, 0x2, 0x2, 0xb8a, 0x5, 0x7, {0x6, 0x0, 0x80, 0x7, 0x2, 0x8000, 0x5, 0xfff, 0x6, 0x8, 0x8, r9, r11, 0x4, 0xffff}}, {0x2, 0xef08, 0x8, 0x1000, '[trusted'}}, {{0x6, 0x2, 0x5e6, 0x4, 0x0, 0x2, {0x1, 0xff, 0x5, 0x2, 0x4, 0x9, 0x700, 0x5, 0x8, 0x4, 0x6, r12, r14, 0xffffffff, 0x200}}, {0x0, 0x1ff, 0x14, 0x3, 'mime_typeGPL$system}'}}, {{0x0, 0x3, 0xf, 0x8, 0xcd, 0x200, {0x1, 0xffffffff, 0x1, 0x9, 0x7fff, 0x0, 0x80000000, 0x8000, 0x2, 0xffff, 0x4, r16, r18, 0x10001, 0xff}}, {0x6, 0x2, 0x12, 0x2, ']/ppp1ppp1#trusted'}}]}, 0x350) r19 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r20) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuseblk\x00', 0x222872, &(0x7f0000001540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r14}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xe00}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}], [{@uid_gt={'uid>', r20}}, {@permit_directio='permit_directio'}, {@dont_measure='dont_measure'}]}}) syz_read_part_table(0xffffffff, 0x6, &(0x7f0000000340)=[{&(0x7f0000000040)="0f598939ea66c501849a66db5c759b4fc67d075759db4b9ecf19d6ca311f06ab", 0x20, 0x99f}, {&(0x7f0000000540)="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", 0x1000, 0x3ff}, {&(0x7f0000000100)="ec89bebe372c9d764867ce2264d77a9bf3e95ae91d23e825c729266a24129297cec765b702b3b01b608c98417359bad180f1fe8fcd789365de15fe3e855a8f990c84db1e590bc1c07a036bab38ec7a0d59c6d318fee5e88d0a0d07cde5ccebfbc9460e43f9bec4ad8bc3b692fbd4be3095032f361d439f8b0faa853a6bc0b17686787e0345ca2789da0d1e1c42ab640cad41d078a04fc8e09ee3483f20897f0641c1a0be22900c286db3959569f8f7aa33d693aa71dc23292a4ff2e91ebb863c03d1910f921c5f619d9550af958c3b727e1a52de3ff96d", 0xd7, 0x7fffffff}, {&(0x7f0000000200)="d3df830a4bae096e58346b0ed9c19e1c9d71550f3d5a241743a2f886941e39f014a71318ccfa7eee328061d2199e582564394bc26093367adbe8cd42c87b2ead2885d48c777a6ca05061f2d6218972bca027800acdd4ed44b00a9b", 0x5b, 0x7ff}, {&(0x7f0000000080), 0x0, 0x5}, {&(0x7f00000002c0)="f55c2d0b6c208941d8eda8f88ab6464076ec07f683905da1949a336d6a4351327bba186ca8399d9367cb9e07454022068401ece0d76f750429e3a556d2e0bc35d296f23f587b0f2ce6a41f392e3d3d5afe91bb1572e5e697832944e70c426e9d8005f3a92d67dfb509e8ae41d5892c7a", 0x70, 0x1}]) [ 235.640927] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 235.640933] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 [ 235.640939] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:25 executing program 1 (fault-call:2 fault-nth:42): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)={[{@dax='dax'}]}) 10:08:25 executing program 2: mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x2002041, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$smack_current(r0, &(0x7f0000000000)={'i_version'}, 0xa) [ 235.882677] FAULT_INJECTION: forcing a failure. [ 235.882677] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 235.895746] CPU: 1 PID: 10583 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 235.903664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.913025] Call Trace: [ 235.915633] dump_stack+0x142/0x197 [ 235.919276] should_fail.cold+0x10f/0x159 [ 235.923431] ? __might_sleep+0x93/0xb0 [ 235.927331] __alloc_pages_nodemask+0x1d6/0x7a0 [ 235.932013] ? __alloc_pages_slowpath+0x2930/0x2930 [ 235.937039] ? avc_has_extended_perms+0xe40/0xe40 [ 235.941901] ? avc_has_perm+0x2df/0x4b0 [ 235.945881] alloc_pages_current+0xec/0x1e0 [ 235.950201] ? cred_has_capability+0x142/0x290 [ 235.954792] __get_free_pages+0xf/0x40 [ 235.958683] get_zeroed_page+0x11/0x20 [ 235.962573] selinux_sb_remount+0x1a6/0x900 [ 235.966899] ? __phys_addr+0xb3/0xe0 [ 235.972096] ? selinux_sb_kern_mount+0x230/0x230 [ 235.976857] ? selinux_capable+0x36/0x40 10:08:25 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x1}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4207, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x40) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000140)={0x0, @reserved}) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="fa16d2f9", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000040)={r4}, 0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0x17}, 0x1}}, 0x4, 0x7, 0x9a69, 0x5b00e279, 0xf1}, &(0x7f0000000700)=0x98) init_module(&(0x7f00000002c0)='/dev/hwrng\x00', 0xb, &(0x7f0000000300)='syz') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x46000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x3b}}, 0x269) fsetxattr$trusted_overlay_redirect(r7, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0)=0x1, r9, 0x0, 0x1, 0x4}}, 0x20) r10 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20100, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x46000, 0x0) lsetxattr$security_ima(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000400)=@sha1={0x1, "dcdf1062967d545357334b5442cc22f67b92c822"}, 0x15, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x3b, 0x3}}, 0x20) r13 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x46000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x3b, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r13, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0)=0x1, r14, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r11, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000340)=0x7f}}, 0x20) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r15, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r16 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r15, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r16, 0x0, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x101}, 0x8000) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r12, r10}}, 0x1f7) [ 235.980924] ? security_capable+0x8e/0xc0 [ 235.985073] security_sb_remount+0x75/0xb0 [ 235.989314] do_mount+0x887/0x27d0 [ 235.992860] ? copy_mount_options+0x5c/0x2f0 [ 235.997267] ? copy_mount_string+0x40/0x40 [ 236.001505] ? copy_mount_options+0x1fe/0x2f0 [ 236.006148] SyS_mount+0xab/0x120 [ 236.009599] ? copy_mnt_ns+0x8c0/0x8c0 [ 236.013524] do_syscall_64+0x1e8/0x640 [ 236.017398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.022245] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 236.027428] RIP: 0033:0x45d35a [ 236.030601] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 236.038359] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045d35a [ 236.046815] RDX: 00007fd7d64c6ae0 RSI: 0000000020000280 RDI: 00007fd7d64c6b00 [ 236.054080] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 236.061352] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 [ 236.068613] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:26 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)={[{@dax='dax'}]}) 10:08:26 executing program 1 (fault-call:2 fault-nth:43): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 236.228241] FAULT_INJECTION: forcing a failure. [ 236.228241] name failslab, interval 1, probability 0, space 0, times 0 [ 236.240957] CPU: 0 PID: 10613 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 236.248887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.258258] Call Trace: [ 236.258284] dump_stack+0x142/0x197 [ 236.258304] should_fail.cold+0x10f/0x159 [ 236.258323] should_failslab+0xdb/0x130 [ 236.258335] kmem_cache_alloc+0x2d7/0x780 [ 236.258345] ? cache_grow_end.part.0+0x92/0x160 [ 236.258360] getname_flags+0xcb/0x580 [ 236.258375] ? lock_downgrade+0x740/0x740 [ 236.268741] user_path_at_empty+0x2f/0x50 [ 236.268758] do_mount+0x12b/0x27d0 [ 236.268769] ? copy_mount_options+0x5c/0x2f0 [ 236.268781] ? rcu_read_lock_sched_held+0x110/0x130 [ 236.268793] ? copy_mount_string+0x40/0x40 [ 236.268807] ? copy_mount_options+0x1fe/0x2f0 [ 236.315395] SyS_mount+0xab/0x120 [ 236.318835] ? copy_mnt_ns+0x8c0/0x8c0 [ 236.322712] do_syscall_64+0x1e8/0x640 [ 236.326582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.331415] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 236.336848] RIP: 0033:0x45d35a [ 236.340024] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 236.347717] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045d35a [ 236.354979] RDX: 00007fd7d64c6ae0 RSI: 0000000020000280 RDI: 00007fd7d64c6b00 [ 236.362243] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 236.369495] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 10:08:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)={[{@dax='dax'}]}) [ 236.376753] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:26 executing program 1 (fault-call:2 fault-nth:44): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)={[{@dax='dax'}]}) [ 236.552597] FAULT_INJECTION: forcing a failure. [ 236.552597] name failslab, interval 1, probability 0, space 0, times 0 [ 236.575399] CPU: 0 PID: 10633 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 236.583319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.592796] Call Trace: [ 236.592817] dump_stack+0x142/0x197 [ 236.592835] should_fail.cold+0x10f/0x159 [ 236.592852] should_failslab+0xdb/0x130 [ 236.592864] kmem_cache_alloc_trace+0x2e9/0x790 [ 236.592873] ? match_wildcard+0x2d0/0x2d0 [ 236.592889] selinux_parse_opts_str+0x3c1/0xa30 [ 236.592905] ? selinux_sb_show_options+0xd50/0xd50 [ 236.625755] ? free_pages+0x46/0x50 [ 236.629376] ? selinux_sb_copy_data+0x21e/0x390 [ 236.634228] selinux_sb_remount+0x1fd/0x900 [ 236.638541] ? __phys_addr+0xb3/0xe0 [ 236.642323] ? selinux_sb_kern_mount+0x230/0x230 [ 236.647066] ? selinux_capable+0x36/0x40 [ 236.651118] ? security_capable+0x8e/0xc0 [ 236.655250] security_sb_remount+0x75/0xb0 [ 236.659555] do_mount+0x887/0x27d0 [ 236.663091] ? retint_kernel+0x2d/0x2d [ 236.666965] ? copy_mount_string+0x40/0x40 [ 236.671206] ? copy_mount_options+0x199/0x2f0 [ 236.675696] ? copy_mount_options+0x1fe/0x2f0 [ 236.680182] SyS_mount+0xab/0x120 [ 236.683628] ? copy_mnt_ns+0x8c0/0x8c0 [ 236.687514] do_syscall_64+0x1e8/0x640 [ 236.691392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.696240] entry_SYSCALL_64_after_hwframe+0x42/0xb7 10:08:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)={[{@dax='dax'}]}) 10:08:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x82004, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)=0x8) [ 236.701426] RIP: 0033:0x45d35a [ 236.704599] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 236.712299] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045d35a [ 236.719571] RDX: 00007fd7d64c6ae0 RSI: 0000000020000280 RDI: 00007fd7d64c6b00 [ 236.726924] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 236.734295] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 [ 236.741561] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:26 executing program 1 (fault-call:2 fault-nth:45): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)={[{@dax='dax'}]}) [ 236.883809] EXT4-fs: 19 callbacks suppressed [ 236.883819] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value [ 236.961296] FAULT_INJECTION: forcing a failure. [ 236.961296] name failslab, interval 1, probability 0, space 0, times 0 [ 236.976129] CPU: 0 PID: 10660 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 236.984042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.993404] Call Trace: [ 236.996001] dump_stack+0x142/0x197 [ 236.999641] should_fail.cold+0x10f/0x159 [ 237.003807] should_failslab+0xdb/0x130 [ 237.007787] __kmalloc_track_caller+0x2ec/0x790 [ 237.012464] ? save_trace+0x290/0x290 [ 237.016266] ? reacquire_held_locks+0xb7/0x3b0 [ 237.016279] ? shrink_dentry_list+0x111/0xad0 [ 237.016290] ? ext4_remount+0xdf/0x1f80 [ 237.016304] kstrdup+0x3a/0x70 [ 237.025359] ext4_remount+0xdf/0x1f80 [ 237.025372] ? save_trace+0x290/0x290 [ 237.025385] ? lock_downgrade+0x740/0x740 [ 237.025400] ? __lock_is_held+0xb6/0x140 [ 237.048401] ? ext4_register_li_request+0x7d0/0x7d0 [ 237.053427] ? find_next_bit+0x28/0x30 [ 237.057383] ? shrink_dcache_sb+0x19e/0x1d0 [ 237.061698] ? shrink_dentry_list+0xad0/0xad0 [ 237.061720] do_remount_sb+0x15e/0x560 [ 237.061735] ? ext4_register_li_request+0x7d0/0x7d0 [ 237.070821] ? user_get_super+0x200/0x200 [ 237.070834] ? ns_capable_common+0x12c/0x160 [ 237.070848] do_mount+0x13c9/0x27d0 [ 237.070857] ? copy_mount_options+0x5c/0x2f0 [ 237.070870] ? copy_mount_string+0x40/0x40 [ 237.070885] ? copy_mount_options+0x1fe/0x2f0 [ 237.101248] SyS_mount+0xab/0x120 [ 237.101258] ? copy_mnt_ns+0x8c0/0x8c0 [ 237.101272] do_syscall_64+0x1e8/0x640 [ 237.101281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.101297] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 237.101309] RIP: 0033:0x45d35a [ 237.108624] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 237.108635] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045d35a [ 237.108641] RDX: 00007fd7d64c6ae0 RSI: 0000000020000280 RDI: 00007fd7d64c6b00 [ 237.108647] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 10:08:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x4) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x200020, &(0x7f0000000100)=ANY=[@ANYBLOB="770ed308f9f77bbe475f7665e64997116162656cec24bb23c46ea816a9805995f5a47f4fc62a6993421bfcffb382750095f955ce3ce76605f1ecf470a0d9985e42161053330f40f4013c84af65b989c00176a019db90a2d095fea47004a830aa5595e409cd59dda0fe88dd7fdc3999d01337cfbc8295d4d0e37a658ce27e3f37b5800e1db31bc2ef32b0fca84533a79b2a75bfd140f4d96d0435233b244cbf96c263ed0363a3afa876cbe83123220b09f247264ab74050290cf874"]) 10:08:27 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2cab4c0703ae"], 0x2) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), &(0x7f0000000240)=0x4) close(0xffffffffffffffff) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x408541, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r2) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ptrace(0x4207, r2) [ 237.108652] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 [ 237.108658] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 [ 237.183661] EXT4-fs (sda1): re-mounted. Opts: (null) [ 237.195179] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value 10:08:27 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@dax='dax'}]}) 10:08:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000240)=[0x3, 0x3], 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x3, 0x9, &(0x7f0000001680)=[{&(0x7f0000000100)="3f599f434b3bcfa6fd893d9c01bd62876372a5ed3a07a985915d9501cb5fd5d87362089a6e636979521f0cc3f2a90f72c0c575f2a88614afaa15161e65f8d7", 0x3f, 0x3}, {&(0x7f0000000140)="5c57df09815b1d12046becd87c733f49ea888f3b27e171e46d049d040e7a97e1751e9b078209c3c068a37ac04303641862ee92bcc4a989a83769601d792af66ba6d59393ce93ca25d13faca11754c53040f7eb2c8c1ba55dba3c3da5338be412063708809fa82dc073114a76209ad48cc3c55c97fcbf0e2252ab8e88eb326242d694b50a567710f68d23b489567966bfb8c07ba9dbe94cad99c4673a", 0x9c, 0x2d45}, {&(0x7f0000000200)="3c7bd65ba1ae", 0x6, 0x50}, {&(0x7f00000002c0)="a58b0fea3886784e0d6ca7eb0b9241aaea9c3c218e68dc188e5f55af50a9bcff8a6509a42fe8de66718ec6c83e9840d8fc1f4cc3b3315f8e38f206351822066b257d875910dcf5df5f59fe7cf35be5053b021d7a39a72744390abec6662276e87b83", 0x62, 0xffffffffffff3679}, {&(0x7f0000000340)="d813b3b6f65088534b61176843a468186da39b146bd7520ee02172c7c109327cb61f70da7473cfe319593e8c68b8174f925b156f89f7c87de07fb0c9937d7cb6b9ac9afae9c8163817af00010b2427616ae83eba06dff536933cb45101ecb0ec239338da8033f0f5a8e89518cdbf953186362701441408ae13f0fa9abc2563e6a8d0e3242b9ff6488386a9e8ada4a41dfd59eb50320e9feebb813a0a1d5825346ba4805568", 0xa5, 0x10001}, {&(0x7f0000000400)="a11affcef99758167b4c239f3738fdf75ad8d871a061bf7fe59339f91dc42c03ba5e611b1121355a7edd714061f0ee7ebc46a48f860b6152ebbc5574abfdae27127b0c6dc863415cd3d9ea737f08b0bb50a3bf78a5de0b768d75bf4eeac5d0ffa898a7a473898f6ab291edb9c480e296c474db604daa862c9cc70189a787776b1f489a1b1747cb49d156fec4f69ae448c298abaf6d1ada75d045f020c89b5123b8a4972a9107ff87cc25b2ae90751fa72ca96b2da8a65d80a03839f754163f94a87595", 0xc3, 0x1}, {&(0x7f0000000540)="1f9e543bed615364c5515cf940f1b51f02d8213b91a751ef024d2d9e6069452ad46898af20b62544c52a1a5e627d85bf898f0efdcf79ef22f37ac6d200f77970828aeb32f5f1cdf79110c486ba0da0d1c58a5feff878a036c1241f3a2527b985e1f75a96e400e30a8b", 0x69, 0x6}, {&(0x7f00000005c0)="5e6f0bb3737027c1a9491a96f599d8640a62e053e8bab95325f60a0484cfc5b0f179d3d5b701640da24adeae823b5f6bdb30ddb08e0e97e871a3c4bf4c429c111f25abcbb6fab8cadf01ded404970991a761e2a6046ac6044ed51d35c204f0f89a38ceb4614b6a398027338035aa46e4280d6b35e654c990b74be1885787da1786ca16d41a88bf9a4c0641147daf8f815aacbf152071105f940687b1e413c46ac35d2bbcf404b0e5bfdac0e5f1096e969fb3a1b5b80e5e0a9c9c47166677a15cdad46aa3d447188f2c03e4203e57b319fb3de00fe97f6612b52c544706f0ec215917a2b9f28b22542db912099bc3bbb3c1c0241b155b5f4806a5484ada1c703d0b8be0083b881ee06376b98b9b977fb8ae9979290b98a493652a9f83877ae9010e66c41c1689d4b9211e8e631bff1ce94f29b1d0cc12d93c7e43ab9e2e68ce9865f9f409b4486df90382c5f91acb200e5280169a4973415d5a660c4027ef535e05535e91cd16e5d27216395e9295ddda6c1a407f6fb2ef29b226053ff7c220053312d23b348eed70352ad470f30a19c7d14b4bf86adefd9bfa9ab0c8411a77910a013336803fbaaa7aac4e52fab569c32ebaf81004b69c5c952df49b5ac14f5fb7674ef3d870b2f5352ea4479d339c540b6b4a8a4b00f083bdd5aa42a1df90ec104f5420a392f4fcbff29c9828575a0bc0ad538f1a45f0e8a68ab253fa51e3be8ce2fbb6c2664a61963443a8b41f4744a5a33a00be60cce30b7ed41b0820570947bd9649a2fabb980e2cfd9f7a00ea6b8bf998b90de48066cae5a54870bcd1e273ae19aa496d499b619d7ed0c5e7edb090bf90d90a9752f9615c0fbd8a17f87f7e5e33890a7134eaa775fc02d900545dc1e6a6474b876a0bc97c1bbd2e5745cf543feff880d4bf927390d5887a562efc3610c3614acc765e14f9ea21b3901c38ed7d1601f323a9dd9dd96eb45f4aab1ff2eda838a14643088098e11057eaae04fbfc6e5a5b6ff01d83c8ae2a46a1a6786c229d3447a101694117b6fccf774b231f213f64120a9a3d89ffe928f23060ea99d0657491b4f1890247a381abedc11e68eb694894cb2bb0c2676fa35d69e782712d98b4c42071e7fddd4ba91f567c21190f470e48d7f0f9e7f09e1372bc39534628cc7fc8080d70c463740390662244822eb38a453038ae1fdcee410c2b7093a298ca2e05a8b64f40aae858ed3524f83b71c7cc622878b66f1be7aa5409cfa718f8873f22af049a1446f8837dc30163c48502bcd120408b2a57e036bd4b4095f80610bb0a59113ed51e2e03f048ef94f62b1a77aab7c57ae1d9f204ecd39e6eb903175f7434800343a91996a4b2a9b172517f754e8719b61fb9f774a635c51a1e3c7bde0c4a98a2448908a6ec66a7da8a3f5ed2c3341236941688aa06e83f1c6e6a1aaa430fa695d739c72b4269c26beccd07e5b34b5e6b3551999d3615b0efd861fb6efe3127c1deb702ca65acc89feabf2170257716a715a124e8dcbcab878c6399930f385aadce92323ff203a84aa39a487011bd05cd6361fb9c5beb72e2f1d6becdd03618de38d12fe992efe9fc769e4f8c9550094c8483529d78347aca9c7671862c2e0c83354436efcbab121664ae41293add4712c711e67384682e8d5c5c3f0fa051860a71d0a050f28f2db44411b0592953f472db53eff4ebdef980538604250efdb127d6f0967c1be5521ccced8d22d1a91f27783facf396f9106a971899cbfcb893e3333a7725cbeb04195a0d34fbb2cbdd0c331a1182fc1b62ddea4ea1a89e399326307e373b3a22202c99846c0ecdecec436e46ee2775ee89b4599405a82cf754de031762f188e419acec46bb57ddef4eab8a8ce1496b0b2435c287f4691227e058becc9df46027dfcaa9cbc8ac9da976e3acb8ba247052ed421a080eda250347081506e2a78a1c09dacd5a1e5298fce6db45a8758c527a725b2a0e5213ad0737072acf2d72f3f55593dae485b95e1c27f473d357a9ab04fe593f312e0a32474e0c753b1577daa6acb1bb0fe78540d900a5e76012ac7c6222d04c0e40b602dfa3351cc4acdd2910d734f11b52664d86b42042be9aeb86ea8c6a15532cb0d1d544336e71c32ab6985cd4f099d56aeb3d44bd3a137135710c81fd206ac93f55c409b22b621e02cbecb0590805c54b6063b374002283240fd991d930b0e4e1424def2fed88dc93da1fa0fb06d809543046ad7398fa8b08264dff37e86725c7a2769293349232ceaf12e6af75205ab79e245d746e4776a4dca0444d35c4760cbc443f4d1d74e3fc8e32beda0f22eec226836e7c59afa419bc3b0ce13bc9c91d83c0bdc5924872da391b1a5d1b4b7f788ac4ae4da94fb80a2e9e7de2f7747794f2b8c9f686a6134aac544fa1f388a240c83715b16e71d870624c899d877addb8bb58b839771749a59c655f996f9b9bd5060c2b27b96f612412a3da73aa62a27f955a0ae96578ad65979901f119567d668d19e80c4554e44892e425b9312fa976bc7147b58edb6464c49ec0c50fd0c3f2934a36e5061a5609e1c46c03df0c2ad448118b8a65979e9e0961f65dc6bed3b58b6175686f9a7b738cea8937149fa3060cc329e0ae0f2057f42b6759451d63d8927f82c5ad46152fea12efd0fd16c8f8f1314b8ef3a682b1c7fccdddd2a2d243f8a888ae930c9b59eb17e7176e14ca1ab97a627294bca02cfed5e7f828f620a60cd26b47527491dee65d50dce40fb4919f6b1c6d19474319310e6826aec020153e689b76ae40ca849c99966aaa0263c7430f3f2ab85118628d6c2657f8a6cd76b5a234fee2eda39b1f0fc189a7c2af48dc3e1355f7e6e1541a6837b4582f1c009bbd4e7ebdbd21596a95f241224761b0aedb265e475bccbeef3f95e1c919b4e950bc172f15a087e0c7e76f0dd34f86c6d2377f53aab3f88019b8f95d1f3273785bfd31cd48ff82258996cc0bb0f36ea48bd095e3d933c4320be8bf79d1ea0a8e43508164f31f459264752887c30e5cb89c9c31ad27cc49e01c9a6bf8d6c262285ca5a64bb076ca928b58d6fe8eb7831591e8d87536709f75788b13eeef7868fb6167eefb6d1fc5c77afe0dd05f4dbec21d9e66a0da854241f1cc0dc5fc3ec752b5fde08ab490eb1fb9755b9eeb24ccdc597db6b9ea913d59b75b73a68c98c4894bb28c99d95c6ad59d994d6220c1c351367267c64655c7ddb6396cdcd4263a3a0c8b8bbda4aff010f3974a2e28cfc40fb865b3d424d007cdaeba37e6c9c58829e8c38d94cf20cc2f0a78dc1d5ba6d16f4208f68e465f4524462680dea86e258dd2fd5e38c20bd80a24f42ca3c0c2b209d265e69746f66519bf8b87e5622e59fbbe74dcdb38be7b561630a2f1a97b60c6008b06103f57830930243b37588701f003d28138c87dd52aa5889e4b050196ab39e72f0be24f15d4f381b59dbc616d0f770750480fb1e32b6001c3288d937e75be8a479c0b8e77baf2e25752edc32551419f6414e6efb42c53e19d0adcc437b883008bd3303741b21c86532e40be68c485e22b49c585ea28719e72e2bb57b27e04ae2420567a8969aa859175594168d024a2bab93ad833ae3a071551eb89b7d9a528f8a404e7c9221e5cbef8ee49e5027754dc6114ef55a4674524e2e82d8ccb3928ee45e5e883599b31cfd5c3291c86127606d87ceafa653307af28a057b701cbe653561fa460f2725ba884d3ddc24dc620e4a354674fd0afb1ccaa2dc3de07d7e4d22436057d6a95ac126b0a5e65b08317ba1cb0c7384af1a0310e87de4dd32782252bebc0feefe29ee6bd7e7979f1a86bb4780b65749e6ac08c66902a06f9df0ceb2a7bd3e4ee14207b95129821c2c640ef3bbb5020db301b6a1b604a7cc1ed734c8be02fd0d0c7bfd974cd3eed935e2a4c3b49fbc9cc0af285e1e5c4d3f9ac5e5762ba64fb62b4848c625a245213e5f2a992401b410467b755f1c31803856f8a42943e7d19247b47cd1290b3db6dd686b3ad34f00782987afaa91dba253e802d0ec6f352480cffdbebb07aacb6d87dc5c2c8a250bd21f2e994f097877a53f9793d4d2d43c7b19f9fe3844edb91c38c57a3f70610b45389bc89d15497ec7bb37af508745b35fe8ae798966fb5ecc7cb6579a145023488e272ca6e11dccea7b97aa6007bf6ec7e71717eda7dac6b20d086bbe837c3cb22e30e42a67f30824c578e03fa6e717e332af2a6ee94ea26c46dbbe823e8f62afb1fb6112510735e224dcd502e933f5a51006b53c2a2613a7f946fac1509b6597559650ade7564e9277b8e352f8b5fcfbd4ec08f414353d34a00fda667149e905b6478ac1af5d999119e2d8fb421b7d533e7bf0a42b5e9694525d39e2984f3aa6d051952a9d7c76c5f6e6259e4e476a22309eca93a67857fab20ac77d44cdd7bbaaa71bea7082d2abb86a2e618422cba67a6845fee31ff579ef6b432782661f202b9b5f0cf0d06b437ec85fca7dfcf33d3af47b5781a399964d08fdc09f8c9ff9d43aec980c3fc8125efbaab5e89c85ccfb9b2478d972e62e01dbf5222ea765c1f8620991f3134ad370624dcda8c98b63d7d8c931583427e486d3b325762be412de5f79cd3b173f2fea93fe01e296560c0a731211c837523e23a08e901f6cc8a4bf1327adaa0f0346101ba9b98d508a53c143f228957ef5692933006419400fd3a7ddb26206c4a4cb357eb27223bf88da57be00dbfb2179b60518d684b054193064e51da6a8d31ab56b9725f7e5854c4712ddf8d1fe8c45bca89bb9da3dfae43ad158ece8fff3a7e2c09780e3239473f2f3e37d419cb5a4110ae2f3526338331211ffc7622063585c728394970f540856e4a86c78082e8748bbd9f323197e652cb4eaaf1d23340781991de56cf5c41d6ff792f5f432d7ad4feebb1824daf47ea4eb94ea2de1411825c595b0d8066b228fbbf69a5e8fac3f83a8faa1be2eb41ec3ffa075de7ac70bd31c36244a7b398bccc157d8d0c899e3bbd6422e125215ded4332729f33f8511ddc5ce00965f8e24afbbd700cf8860c1105e7bda3d25ba12a894a56e6a2b9da3bad20962a75b21334282c24cabb0a930fb96e3f0f0f1866f3ac5b8d051e32113ae92da1bcfc8a5f939371a1137dccc7b040c565876935b2ca1dd638be0384d2ecd758bfea2902af6c926ea5d011e2d2857f29b0e022d0c9a3a4a7eb52caf2646ce03d3de456de09b718e02a3f2b0b6f7aab9ac762cd639fad8b879c309f48ef47e3ee178417a83a0a5bb8f7e55857b3eb99c509b2a2acd7fb817137d6687157355ba1d1c9c57a69ae90d3183cd4de6cb078108bd334e159b4e1b1b038b2efaffae5bf8c51fbb21e159b87b07f782046d48ec19f6c3c70b336007adefe51080ac42a780f816aed7d2da7f57a0037625b313b9caf03f4dc5402d01c578f3e2d34441729c4982f6a11dfa716dd6c69e43723a8e953ee8d34f440191fc8f87c2ffc92b8f94f5e397579269bde7da9889456f374f216a2b3c815ab84c5ec7cb46d0129b2fa61fd5d71daeedf5df9c115f2da647f075f007e2900e9ea6d94c63c5b2f85dd6b51d21c1a5d6e1f84b5ab04e18ec5bd6da688ea97710f066aba94cc5cb7c6341dfa46bb222711db6a15bc1863a4bad19e8bba64c6ebe820ea8686e493d6dff411d33bebeaec073ab84551a1c2b268e38bd6f7fd49ab8ace8d493b43096433d9b159fcc87466c7fe677831bb9b633bb885f2bde9e204ea63467882b3b89860666c176ec87d46b2af2fda222bcbdd09afdcfb5d30b2d7cce6f698581549e4b78b96aa2f6aa60450c13ac1408a", 0x1000, 0x1}, {&(0x7f00000015c0)="83715651d9ae74c518daa269e60a2dfaa126f1c05697add4811a6abaf6dbda74809663bd580d7eb1a2dab1334f54fb7c9a95131169f5d1e402c17e07116f9d3359fe9b643936439b7af02d88851632d5b2925d28160e3750d1d06ae8f41c7b60eb820d0acaac89d3dd151b78f25f2aa3134a2a0581a87e3861940cf78c99a4637b6ded45e713281840ea507b139088b4bc14327d56c6bb9869b7195608a4f2f50cb58d90af25", 0xa6, 0x10001}], 0x200, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x1, 0x0, 0x0, 0x80000, &(0x7f0000000500)={[{@minixdf='minixdf'}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 10:08:27 executing program 1 (fault-call:2 fault-nth:46): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 237.266920] EXT4-fs (sda1): Unrecognized mount option "wÓù÷{¾G_veæI—abelì$»#Än¨©€Y•õ¤OÆ*i“Büÿ³‚u" or missing value 10:08:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@dax='dax'}]}) [ 237.372633] FAULT_INJECTION: forcing a failure. [ 237.372633] name failslab, interval 1, probability 0, space 0, times 0 [ 237.421012] CPU: 0 PID: 10697 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 237.428959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.438344] Call Trace: [ 237.440949] dump_stack+0x142/0x197 [ 237.444591] should_fail.cold+0x10f/0x159 [ 237.445162] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=0b6f5e00) [ 237.448744] ? __lock_is_held+0xb6/0x140 [ 237.448762] ? mempool_free+0x1d0/0x1d0 [ 237.448774] should_failslab+0xdb/0x130 [ 237.448785] kmem_cache_alloc+0x47/0x780 [ 237.448805] ? mempool_free+0x1d0/0x1d0 [ 237.476579] mempool_alloc_slab+0x47/0x60 [ 237.480764] mempool_alloc+0x138/0x300 [ 237.484664] ? remove_element.isra.0+0x1b0/0x1b0 [ 237.489426] ? save_trace+0x290/0x290 [ 237.493239] ? save_trace+0x290/0x290 [ 237.497044] ? __unlock_page_memcg+0x53/0x100 [ 237.501549] bio_alloc_bioset+0x368/0x680 [ 237.505732] ? bvec_alloc+0x2e0/0x2e0 [ 237.509541] ? lock_downgrade+0x740/0x740 [ 237.513695] submit_bh_wbc+0xf6/0x720 [ 237.517604] __sync_dirty_buffer+0xcf/0x260 [ 237.521921] ext4_commit_super+0x715/0xa70 [ 237.521946] ext4_remount+0x161a/0x1f80 [ 237.521973] ? ext4_register_li_request+0x7d0/0x7d0 [ 237.521987] ? find_next_bit+0x28/0x30 [ 237.522000] ? shrink_dcache_sb+0x19e/0x1d0 [ 237.522009] ? shrink_dentry_list+0xad0/0xad0 [ 237.522035] do_remount_sb+0x15e/0x560 [ 237.535240] ? ext4_register_li_request+0x7d0/0x7d0 [ 237.535254] ? user_get_super+0x200/0x200 [ 237.535268] ? ns_capable_common+0x12c/0x160 [ 237.535284] do_mount+0x13c9/0x27d0 10:08:27 executing program 2: r0 = msgget$private(0x0, 0x41) msgctl$IPC_RMID(r0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000200)={0x4, 0x0, [{}, {}, {}, {}]}) r2 = socket$inet(0x2, 0x801, 0x1a) getpeername(r2, &(0x7f0000000100)=@x25={0x9, @remote}, &(0x7f0000000180)=0x80) creat(&(0x7f0000000040)='./file0\x00', 0x62) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) r4 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x853, 0x200000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f0000000300)=""/17) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 237.535293] ? copy_mount_options+0x5c/0x2f0 [ 237.535307] ? copy_mount_string+0x40/0x40 [ 237.535321] ? copy_mount_options+0x1fe/0x2f0 [ 237.582350] SyS_mount+0xab/0x120 [ 237.585811] ? copy_mnt_ns+0x8c0/0x8c0 [ 237.589711] do_syscall_64+0x1e8/0x640 [ 237.593607] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.598456] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 237.603630] RIP: 0033:0x45d35a [ 237.606802] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 237.614495] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045d35a [ 237.621762] RDX: 00007fd7d64c6ae0 RSI: 0000000020000280 RDI: 00007fd7d64c6b00 [ 237.629024] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 237.636277] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 [ 237.643528] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 [ 237.656373] EXT4-fs (sda1): re-mounted. Opts: 10:08:27 executing program 1 (fault-call:2 fault-nth:47): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 237.845655] FAULT_INJECTION: forcing a failure. [ 237.845655] name failslab, interval 1, probability 0, space 0, times 0 [ 237.872000] CPU: 1 PID: 10730 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 237.879925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.889285] Call Trace: [ 237.891879] dump_stack+0x142/0x197 10:08:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@dax='dax'}]}) [ 237.895523] should_fail.cold+0x10f/0x159 [ 237.899673] ? __lock_is_held+0xb6/0x140 [ 237.903863] ? mempool_free+0x1d0/0x1d0 [ 237.907848] should_failslab+0xdb/0x130 [ 237.911832] kmem_cache_alloc+0x47/0x780 [ 237.915909] ? mempool_free+0x1d0/0x1d0 [ 237.919904] mempool_alloc_slab+0x47/0x60 [ 237.924058] mempool_alloc+0x138/0x300 [ 237.927956] ? remove_element.isra.0+0x1b0/0x1b0 [ 237.932718] ? save_trace+0x290/0x290 [ 237.936529] ? save_trace+0x290/0x290 [ 237.940340] ? __unlock_page_memcg+0x53/0x100 [ 237.944845] bio_alloc_bioset+0x368/0x680 [ 237.949007] ? bvec_alloc+0x2e0/0x2e0 [ 237.952815] ? lock_downgrade+0x740/0x740 [ 237.956976] submit_bh_wbc+0xf6/0x720 [ 237.960790] __sync_dirty_buffer+0xcf/0x260 [ 237.965117] ext4_commit_super+0x715/0xa70 [ 237.969365] ext4_remount+0x161a/0x1f80 [ 237.973356] ? ext4_register_li_request+0x7d0/0x7d0 [ 237.978379] ? find_next_bit+0x28/0x30 [ 237.982273] ? shrink_dcache_sb+0x19e/0x1d0 [ 237.986604] ? shrink_dentry_list+0xad0/0xad0 [ 237.991180] do_remount_sb+0x15e/0x560 [ 237.995076] ? ext4_register_li_request+0x7d0/0x7d0 [ 238.000094] ? user_get_super+0x200/0x200 [ 238.004228] ? ns_capable_common+0x12c/0x160 [ 238.008635] do_mount+0x13c9/0x27d0 [ 238.012245] ? copy_mount_options+0x5c/0x2f0 [ 238.016642] ? copy_mount_string+0x40/0x40 [ 238.020873] ? copy_mount_options+0x1fe/0x2f0 [ 238.025358] SyS_mount+0xab/0x120 [ 238.028807] ? copy_mnt_ns+0x8c0/0x8c0 [ 238.032691] do_syscall_64+0x1e8/0x640 [ 238.036606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.041437] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 238.046607] RIP: 0033:0x45d35a [ 238.049778] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 238.057468] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045d35a [ 238.064733] RDX: 00007fd7d64c6ae0 RSI: 0000000020000280 RDI: 00007fd7d64c6b00 [ 238.071987] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 238.079238] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 [ 238.086502] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 [ 238.128449] EXT4-fs (sda1): re-mounted. Opts: [ 238.139777] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:28 executing program 1 (fault-call:2 fault-nth:48): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:28 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:28 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) write$P9_RRENAME(r1, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:08:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, 0x0) [ 238.293245] FAULT_INJECTION: forcing a failure. [ 238.293245] name failslab, interval 1, probability 0, space 0, times 0 [ 238.314947] CPU: 1 PID: 10755 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 238.322877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.332241] Call Trace: [ 238.334847] dump_stack+0x142/0x197 [ 238.338497] should_fail.cold+0x10f/0x159 [ 238.342667] ? __lock_is_held+0xb6/0x140 [ 238.346728] ? mempool_free+0x1d0/0x1d0 [ 238.350693] should_failslab+0xdb/0x130 [ 238.354655] kmem_cache_alloc+0x47/0x780 [ 238.358710] ? mempool_free+0x1d0/0x1d0 [ 238.362671] mempool_alloc_slab+0x47/0x60 [ 238.366805] mempool_alloc+0x138/0x300 [ 238.370682] ? remove_element.isra.0+0x1b0/0x1b0 [ 238.375426] ? save_trace+0x290/0x290 [ 238.379211] ? save_trace+0x290/0x290 [ 238.383019] ? __unlock_page_memcg+0x53/0x100 [ 238.387601] bio_alloc_bioset+0x368/0x680 [ 238.391750] ? bvec_alloc+0x2e0/0x2e0 [ 238.395538] ? lock_downgrade+0x740/0x740 [ 238.399692] submit_bh_wbc+0xf6/0x720 [ 238.403497] __sync_dirty_buffer+0xcf/0x260 [ 238.407864] ext4_commit_super+0x715/0xa70 [ 238.412097] ext4_remount+0x161a/0x1f80 [ 238.416072] ? ext4_register_li_request+0x7d0/0x7d0 [ 238.421142] ? find_next_bit+0x28/0x30 [ 238.425051] ? shrink_dcache_sb+0x19e/0x1d0 [ 238.429367] ? shrink_dentry_list+0xad0/0xad0 [ 238.433887] do_remount_sb+0x15e/0x560 [ 238.437764] ? ext4_register_li_request+0x7d0/0x7d0 [ 238.442764] ? user_get_super+0x200/0x200 [ 238.446900] ? ns_capable_common+0x12c/0x160 [ 238.451302] do_mount+0x13c9/0x27d0 [ 238.454910] ? copy_mount_options+0x5c/0x2f0 [ 238.459303] ? copy_mount_string+0x40/0x40 [ 238.463523] ? copy_mount_options+0x1fe/0x2f0 [ 238.468001] SyS_mount+0xab/0x120 [ 238.471435] ? copy_mnt_ns+0x8c0/0x8c0 [ 238.475310] do_syscall_64+0x1e8/0x640 [ 238.479189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.484050] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 238.489233] RIP: 0033:0x45d35a [ 238.492467] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 238.500158] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045d35a [ 238.507421] RDX: 00007fd7d64c6ae0 RSI: 0000000020000280 RDI: 00007fd7d64c6b00 [ 238.514675] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 238.521963] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 [ 238.529218] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 [ 238.609993] EXT4-fs (sda1): re-mounted. Opts: [ 238.627956] EXT4-fs (sda1): re-mounted. Opts: 10:08:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, 0x0) 10:08:28 executing program 1 (fault-call:2 fault-nth:49): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 238.705419] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x11) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x2, @broadcast, 'nr0\x00'}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="60b57b6258141c57bc580eb390ff6a31951bdbf827bf03e40f93b6498f13c58017974177a40811e1546a966bfff46f83700b894da871435432ac6dc8854f8fc3208fcf58e8b4a8342837c889e74ff576b1661f1297e90c9062b1c25e4d53cfd7688092cbfe690164373f3b3cc36c6feafe6d32a7ccefbac1ce4018f0b083af2c", 0x80}, {&(0x7f0000000200)="4bd10ad263345736edca86e222985ca5b8a65056ea872db94642183f20d42f4d5193784464dd101a6521c14032fe195613682705a880e61f6c63914c590d2cfa83da2aa9859bb145309404b2203998bec70aa019d6ee7110f55f68e38e777b7f287fd208f993acaa889d61350b5048d3", 0x70}], 0x2, &(0x7f00000002c0)=[@mark={{0x14, 0x1, 0x24, 0x5}}], 0x18}, 0x44) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 238.821570] FAULT_INJECTION: forcing a failure. [ 238.821570] name failslab, interval 1, probability 0, space 0, times 0 [ 238.838986] CPU: 1 PID: 10788 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 238.846989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.856350] Call Trace: [ 238.858951] dump_stack+0x142/0x197 [ 238.862599] should_fail.cold+0x10f/0x159 [ 238.866764] should_failslab+0xdb/0x130 [ 238.870748] kmem_cache_alloc_node+0x56/0x780 [ 238.875276] ? __lock_is_held+0xb6/0x140 [ 238.879351] create_task_io_context+0x31/0x3d0 [ 238.883943] generic_make_request_checks+0x1505/0x1ac0 [ 238.889226] ? rcu_read_lock_sched_held+0x110/0x130 [ 238.894261] ? blk_cleanup_queue+0x610/0x610 [ 238.898683] ? trace_hardirqs_on+0x10/0x10 [ 238.902925] generic_make_request+0x7d/0xa40 [ 238.907333] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 238.912266] ? blk_queue_enter+0x520/0x520 [ 238.916506] ? find_held_lock+0x35/0x130 [ 238.920573] ? guard_bio_eod+0x161/0x530 [ 238.924653] submit_bio+0x1a5/0x3f0 [ 238.928281] ? submit_bio+0x1a5/0x3f0 [ 238.932087] ? generic_make_request+0xa40/0xa40 [ 238.936757] ? guard_bio_eod+0x1fd/0x530 [ 238.940829] submit_bh_wbc+0x550/0x720 [ 238.944733] __sync_dirty_buffer+0xcf/0x260 [ 238.949062] ext4_commit_super+0x715/0xa70 [ 238.953305] ext4_remount+0x161a/0x1f80 [ 238.957295] ? ext4_register_li_request+0x7d0/0x7d0 [ 238.962315] ? find_next_bit+0x28/0x30 [ 238.966211] ? shrink_dcache_sb+0x19e/0x1d0 [ 238.970548] ? shrink_dentry_list+0xad0/0xad0 [ 238.975058] do_remount_sb+0x15e/0x560 [ 238.978941] ? ext4_register_li_request+0x7d0/0x7d0 [ 238.983958] ? user_get_super+0x200/0x200 [ 238.988107] ? ns_capable_common+0x12c/0x160 [ 238.992521] do_mount+0x13c9/0x27d0 [ 238.996185] ? copy_mount_options+0x5c/0x2f0 [ 239.000639] ? copy_mount_string+0x40/0x40 [ 239.004889] ? copy_mount_options+0x1fe/0x2f0 [ 239.009405] SyS_mount+0xab/0x120 [ 239.012959] ? copy_mnt_ns+0x8c0/0x8c0 [ 239.016850] do_syscall_64+0x1e8/0x640 [ 239.020738] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.025598] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 239.030788] RIP: 0033:0x45d35a [ 239.033980] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 239.041696] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045d35a [ 239.048970] RDX: 00007fd7d64c6ae0 RSI: 0000000020000280 RDI: 00007fd7d64c6b00 [ 239.056240] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 239.063515] R10: 0000000000000020 R11: 0000000000000202 R12: 00007fd7d64c76d4 10:08:29 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) ptrace(0x4206, r0) ptrace(0x4207, r0) [ 239.070793] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:29 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:29 executing program 1 (fault-call:2 fault-nth:50): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, 0x0) [ 239.400181] FAULT_INJECTION: forcing a failure. [ 239.400181] name failslab, interval 1, probability 0, space 0, times 0 [ 239.435342] CPU: 1 PID: 10820 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 239.443363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.452722] Call Trace: [ 239.455321] dump_stack+0x142/0x197 [ 239.458965] should_fail.cold+0x10f/0x159 [ 239.463214] should_failslab+0xdb/0x130 [ 239.467198] __kmalloc+0x2f0/0x7a0 [ 239.470744] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 239.476197] ? kobject_uevent_env+0x378/0xc23 [ 239.480700] ? rcu_read_lock_sched_held+0x110/0x130 [ 239.485723] ? kobject_get_path+0xbb/0x1a0 [ 239.489964] kobject_get_path+0xbb/0x1a0 [ 239.494030] ? devm_device_remove_groups+0x50/0x50 [ 239.498961] kobject_uevent_env+0x39c/0xc23 [ 239.503291] ? lock_downgrade+0x740/0x740 [ 239.507447] kobject_uevent+0x20/0x26 [ 239.511262] loop_clr_fd+0x4a7/0xae0 [ 239.515012] lo_ioctl+0x8ea/0x1ce0 [ 239.518563] ? SyS_mount+0xcf/0x120 [ 239.522195] ? loop_probe+0x160/0x160 [ 239.525997] blkdev_ioctl+0x96b/0x1860 [ 239.529887] ? blkpg_ioctl+0x980/0x980 [ 239.533779] ? __might_sleep+0x93/0xb0 [ 239.537671] ? __fget+0x210/0x370 [ 239.541131] block_ioctl+0xde/0x120 [ 239.544763] ? blkdev_fallocate+0x3b0/0x3b0 [ 239.549349] do_vfs_ioctl+0x7ae/0x1060 [ 239.553249] ? selinux_file_mprotect+0x5d0/0x5d0 [ 239.558108] ? lock_downgrade+0x740/0x740 [ 239.562263] ? ioctl_preallocate+0x1c0/0x1c0 [ 239.566682] ? __fget+0x237/0x370 [ 239.570149] ? security_file_ioctl+0x89/0xb0 [ 239.574571] SyS_ioctl+0x8f/0xc0 [ 239.577950] ? do_vfs_ioctl+0x1060/0x1060 [ 239.582108] do_syscall_64+0x1e8/0x640 [ 239.585999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.590855] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 239.596046] RIP: 0033:0x45a777 10:08:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)) [ 239.599235] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.606954] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 239.614311] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 239.621581] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 239.628850] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 239.636126] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:29 executing program 1 (fault-call:2 fault-nth:51): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)) [ 239.800183] FAULT_INJECTION: forcing a failure. [ 239.800183] name failslab, interval 1, probability 0, space 0, times 0 [ 239.814956] CPU: 0 PID: 10835 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 239.822872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.832249] Call Trace: [ 239.834892] dump_stack+0x142/0x197 [ 239.838531] should_fail.cold+0x10f/0x159 [ 239.842714] should_failslab+0xdb/0x130 [ 239.846703] __kmalloc+0x2f0/0x7a0 [ 239.850249] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 239.855705] ? kobject_uevent_env+0x378/0xc23 [ 239.860228] ? rcu_read_lock_sched_held+0x110/0x130 [ 239.865251] ? kobject_get_path+0xbb/0x1a0 [ 239.869492] kobject_get_path+0xbb/0x1a0 [ 239.873661] ? devm_device_remove_groups+0x50/0x50 [ 239.878594] kobject_uevent_env+0x39c/0xc23 [ 239.882925] ? lock_downgrade+0x740/0x740 [ 239.887096] kobject_uevent+0x20/0x26 [ 239.890904] loop_clr_fd+0x4a7/0xae0 [ 239.894624] lo_ioctl+0x8ea/0x1ce0 [ 239.898170] ? SyS_mount+0xcf/0x120 [ 239.901803] ? loop_probe+0x160/0x160 [ 239.905608] blkdev_ioctl+0x96b/0x1860 [ 239.909580] ? blkpg_ioctl+0x980/0x980 [ 239.913477] ? __might_sleep+0x93/0xb0 [ 239.917364] ? __fget+0x210/0x370 [ 239.920843] block_ioctl+0xde/0x120 [ 239.924479] ? blkdev_fallocate+0x3b0/0x3b0 [ 239.928894] do_vfs_ioctl+0x7ae/0x1060 [ 239.932839] ? selinux_file_mprotect+0x5d0/0x5d0 [ 239.937600] ? lock_downgrade+0x740/0x740 [ 239.941764] ? ioctl_preallocate+0x1c0/0x1c0 [ 239.946176] ? __fget+0x237/0x370 [ 239.949641] ? security_file_ioctl+0x89/0xb0 [ 239.954054] SyS_ioctl+0x8f/0xc0 [ 239.957434] ? do_vfs_ioctl+0x1060/0x1060 [ 239.961592] do_syscall_64+0x1e8/0x640 [ 239.965483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.970334] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 239.975532] RIP: 0033:0x45a777 [ 239.978727] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.986440] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 239.993717] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 240.001028] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 240.008303] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 240.015580] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:30 executing program 1 (fault-call:2 fault-nth:52): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:30 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) prlimit64(r1, 0xf, &(0x7f0000000000)={0x800, 0x6}, &(0x7f0000000040)) ptrace(0x4207, r0) [ 240.081010] ptrace attach of "/root/syz-executor.3"[10799] was attempted by "/root/syz-executor.3"[10842] 10:08:30 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, &(0x7f0000000500)) 10:08:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x60) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) sendmmsg$sock(r0, &(0x7f0000001ec0)=[{{&(0x7f0000000140)=@llc={0x1a, 0x307, 0x1f, 0x0, 0xfd, 0x5}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000001c0)="2d0f9f8d72e20bfc8be7ac50fa9ace6de25169b46275d2a8d30f389347280c10550ca734e18b6f924b744aec69d605f38058c61a74a8d1c41ec26a70bb9748bc5b4527650f4f66ae4c38f781b2c72c6134d498451b8f80bf4b046eec6318671c88f259746ab050acbf764a9efefc6ffa", 0x70}, {&(0x7f00000002c0)="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", 0xfe}, {&(0x7f0000000240)="db8ac2e896cb07ad4fc0", 0xa}], 0x3, &(0x7f0000000400)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x7ff}}], 0x78}}, {{&(0x7f0000000480)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0xc74f, @empty, 0x1}}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000540)="4da4c1b887ac801d12f239729d218c493dbe779ac6f8dcc8cca884b6bea7d3dbd029f8b60d21d370ee1fa6190d7a89cb077ec10b91dfd4d57934f9eafe2ae451fad9804a7b541da793728fc39b7d7bfc4809b811f36a8bf2d423db0ca604dc1a4d73757964a439512c3e5cf7f5895837c8e08fd1", 0x74}, {&(0x7f00000005c0)="fdcaabd98e30b2c10e5afd666b4261fedc3adb70fbc5d0c142d4cc59527658651a971afca9769b87c3315850583b7a7c9529f6cce088c4fc8d72041a77fa2ea693bb78ac8780bf2f3cf75c13b34a964a1c0e5ce1b8718454b4db15135a730fcebd5cc0e65c1235ac7c3d8846bb081efb9dad64d19d44e059f9b8cd0eda8640737ce4ef799116bc458fda9f23f8edaa48e60b6ab450e4625b32e475a23e1ff9ac930703585df742a13f314b8e9f577f57c62a9df2703552f0c5c00eba8d025c3ad3433e8e2c54725dce6b68df5c9f252cee307412b7682c356fd2928dfe7d47d3", 0xe0}, {&(0x7f00000006c0)="32a0357f997733b0d19797a8ce0b70e3619cc0157273c6ab746a5150b82e4ec0b0263b8ffcd246b339d6e7756d74dddebc93628c4d33ab17023f09c1759e6304e341cb397c68c5da6f7c09cdf220c5448fb6e41f562f1f005e633870b103c9d0a3cc0d8ccc187bf9d5e4e0d806d151abdfa173d69bcc4cb79b5003071ae16e5eb53b3891a3e8bb21eff00c292e438a8c64a5376438f42d0851de2ca1bb0abe3d", 0xa0}, {&(0x7f0000000780)="64700caa7b65c7af7128ddefd82810b5425d95fb58082ed3776d307dd77162a0a4bc177f24740a3c1837aa10f359f5c0b824e45f87435c3547e1849f46300b9dccd6ea3b55796b80bff525dee8f13209c7c40999efecd954d8712058e35a78a3a1a18313944b14abfe65e589d512d0c2c2c8d736ab4a989073719ab4f499204493f0429cbe62818b25c1a64df4d9bea1c55b035008bfcab6bb4ae7a8d6c8babe47dd470d2c617d9427680810f3c77ebf4636c4727dec62e794bfc743a05036bbc13aa3a39479c20771c1dd4126c8995566c395f90bca3de2c1d5d17d2b39105435e4f5c9b323ddb101e355bdde597b0cf9d478b5157365497243c55e8636db41be27694c7d618d59a937e5008a1e7abfc8f1e310c5f35ff65505e3559c5fa8d0e57f55f10e0b52c41e947c8d5e8fe3e6f558982d937ee8190ad5936bf74f6b2b6c34616da6434c7b30e58ee970e474ebf6c58fb74a2fffabf43bda14587a07ee4f579ea9bce7da849cbf7d8a0d333fdafed385f8b6d26a0e57926ce8e1330a136302f922c44aa218e8399b38a665ce733559b050574c64ddc6f804e5db202e30fe93c66c2f655ef0e3aa7b5bbb8e31e7f4b6b0da9a2adfc567be05a94394fdfd58be6a744315830bb5a030aaa53d104b2d34004f17fecb13bf9f0f9ef14c032851380a4932e2b1b34f35b3af39be9c9da168900dccf22d9f269f4759a02024b48862995224917d333c92080aed3d1bfa97ed466aabe099fd0bac00b6a4562c078ce06ddce6a9d438fd27568f353ed37f6bb1cc0d8d5e0f59de0002da429ac8748ade14b91c848a11474e601fd09d86d064616169bf846fed373ba3ccdb6cb0d95b03700a1d12de71d3d12bb23c69304a4ce452f7b1ebba52f1cd3d55fc6fd4e3971653aa6dc00e824502a25f42d7f3c237476181662180eaf96cd9e268b1029b4a1f9405c9c2cc23d3ebd7edd60e2af6f4082cb55809b9376103025eb63332d28878ca4525afd5dd2a4c47dabc1456bfc62ff415bfdca5f77c50542544c681a43b6fd1bfb1998af0d566ed0377afedc88455891308fc996dfd36dd8978f47de37be975bc6f498654082eb03b211edf6beb4dd4163f877812f204d6a95b24f8dc343b91dbe36de70abee9ed277e3dab92cb22d979a7248b950ecfa481c946920863617b7f316b0f103d33bde133bda7c2480293292d81cefd550dace756abdf45f8cdaedfcb4cde19251c3b2deb562c78cb3f1335fe7c093476b727c712e53915c9a1d5600304afd9e66e5a9be5df56c93c2f43e72856d91958d96d99afae0260f799b507c4b29cb0cf88554ac7dd9cf960d9d7df35c96ec05fadff3068ddfc794d93b1e99c328d56f7df8e1092f60d30a50e7181178fbd2d709635290dc627b9c1c052b96061f48d301888fa8a1339b7fdecc0290b167750e9da4bc824a6dfec5c4ac1b97867ed7c1779929818a9db729a2bc30fe64e0eee130dd8f4cf1e1c382955c1182cc3922eb323af7ce66c6f2611358aa8d9af80a7aace87df738166fdcbd56b0b5c59d7dbcac17fdd4065e33471f46e47725e0a36af858d5d0158723024e255b8bbabb40b8f5e189a2471a677323e3859bf6449e9c626d2e084175db959391bfaded2b5065ccd465c05e564a4c796af63be125e8ed9e8489d36ad54e0a751e9606bb3682168b9f83d36357e66c25903748c34a0d4ec725531b677b6f8fcd0e4f4f2143b41928a603c9a9828495d9f8a63d457847f2334348b8066d9a547f9b9df412612032f13f6770001895f012241b8dae04beef90afbf0ac8dae84d792f28aebd73a4a3cc0c721d74f9cd4f4890019c2329e4e801ad749cc4a7b64ea6571e8bfbc2c383a5ae8940825dee2681d6a80f4d1ba0f7e0749f3426810ab96e2f43c41649f560d97d2ff8e614aea5254e97408f6c6d512a84bf7d2be495e1ee6b0dd91f9b3126560c1ae7ce1c35d7df9f8944034bda70f650773bf1c4ddbb2c31a1bc7a76e08d2b34d511d2faa28db33b3c21e6a67c3d5004e10a398eec8064215e0cece229cc296c97c5add6f9de23b7a17e139b1bd2f15a04ee8167a76347038cec06a4ec5f028a04087e2f082381006e271fb48b1f9b9517221d3adf1eb33ff8e6884306bed7dd0196bd62f16d58be0e1351b406adc9daca526036280f9b62a066a77911b764f54c2cd49870e5dae722754599899f73bf12fffd3c9e967a5729d4c5088962e0f2a693fda7b21735be688787ce99ccf6f84f65a30df9fa2bbd7cae2e95feb280702d4067c1f0e98560c0052b8b489305860f7a56e4da735130e62dcf573de4fa54163a0ad30e48ae1f6962c9fe7c6203d5490cc981aecb23e112557d36371cbbee1eee02e435e103d6cf4cb484e18d65a93c1d3842d76fe473f0f1bf646328555de8f7587cc60bc748a883fd805d2224ff4cbd4cd0d947f38f436c29645401b48b0c4c08f8dadb56ccaf8320a5414ebc3082457e49c4abb540ae5b52602a57e40165758857875879a96bea0c6120953361a06c7bfb6d767beeb4b959d3da823d5dae3dba56a25d9fc2ab63a0b4b7d8dcb810b3a844284df42a3643c8f9b2a2357778bc8271c2788f20947f5d1d0abca629aaacf197fc21a2c3a27af8a8019afc6e784f8e490e0c2e473b1aa2ed759f523f8af61b500f6a18ae1f8d88c03f04af77a374641424230352dd0947b44f3f926ef0dad1c121b49fbcab55358d8222108d15db6aa7a830a1dbf06f611e2e27914b22456f0dad941057aae586b9e5bafa85921231d6f80cae7bc4805e2cc59dad04cb14dbfe5eb466c511b81f2eb6a32e3fd70ad972b8b8d78cc346b803e54a623bc6fe10d6a3f71cf88919fa11327c839142654020c777d6e16294f1cead8a6cd50b9ef474d7eb79d7a658dc362d5a01db275e4365d9913e2d5cd85465a6dbec324c3f9561c9e9612cbeb2188d03ca52e0b08ee2a067a94e525145f854195e475ca985f7619075a888071cc253cbd299a7c0581ff30544dfa0e7043eff55cb65c6b0e885a648996eceade293c494ea84ae6c5f8e9c45ea513b235517026fb2c3b27790a0f2baae8a3d37a211d117303248f2fe8283d85762f8443323cf5a892a5ff2c8d954a1d3ee1e7a1f055fd0be97ce8b9a076ff732f4d05cc660df4ceb40f9ffe9070c5a494d94a983e78c11bfe1c33ed5e7ea370cd3d037dbb68b80ca88774ca09c883dec99f9e2407cef10a1388119c9e246b7a7ddec353d9edbae9815bfae8aa81780bbfbd7e321f964e6f2d845cc640bca709f34225ba3e9396852495e98642f2caddd107199864ca8776b56e88e4528603d10b600afdf6759cbc00ae5263ec8a74c1ce9fcada3b612ac0d5facc221dd8eba0a2f1472138df2f90f444a043c538d797133946a40d80981831904047b3f27f3e85c1a325e975b9d71a2955204a3a6da3a04877efc4ed9b4953a4c6efa02736b49cf1ebc84bf1c9dbd59ece5f4867eb58b1b15734cdb255a56e792af7101e760d01b29392cfc7aef22fe12b4a6ea06da0fd1045dd596afe3ec52e47e640d2b2f5dac1a9df13826cba41ed2ae1097199ed6c97f356d6948ad91579e42a74844b8dfb88a59436eab06a1ec6ac678d78fdad80f78c1cbe77496a92db7c1d06190143f27b058415ebef29407935aa8526a7ed76455ea6ac2afdc9682206961e6e7d58569e3b8418a31f2d9971dd69f1bdc675a193f2aa9f099d64f515d4a665f902f230e5c81af72539d08d26b3bb696b57a33e1d57d5e59bb4d0ada7b9847923d1ea79e806ccea68ed56dc56543a9dcf91165150adc4aebab25f052532434b50b50289c65cd77406827fbf1d3c2665ba2f913d1d63b7ee88aff27552a3505f79bb3953bf219b23c20f0b02da88b25275a70df9ec90bcce1816573c15a7233332fe12b3b046974e7f652a7aeda852f56c7d9b99ad3ccafc24f570dfd11d120a47f6101df1db2693cc3c1c7e14a672c0bfa18a6fe32a96ea33f59ae6077f4cde8ceb2cfa85c4f329b246fe7a31da0c8ecbbe951c3d1343fdd707ee46736694282997742b79c2190f6436a650dcec0f5fa14c47f7f4c242520aad32b6ab0d7b8d5d37445365e6cb9859f31fc0f0fd7f28de04c1b0af18e8b145956655eaecf47711754ae563d795687b20d865972dfc774401a3f292816a9672dfa3c4653aa7c1a1a19c765c4ea43a4b77b20d58891fcdc01283a254a098389ec658798b405afe505bd283853f9b961d18a336169569883610ce7299632f1bbcdb409c42213ba4d2b42dcf9c117a3288f030819235f15ea1d69f5a2b9f0a85e9c9b8cf41dc49792c20198c847587bcc500cb0eae316679f59fa8c17425a8d8e871aa96a80cb79037cca33c0276f95d9926247c1251eded4b2de93d40621e5d27f10c2cc1181bdf41c19857c51c27c66a9249dc70557006c116030c1ed099ad993e4c1f35076193aa2f47d09d89f82c0374ccf962129bf38a0bb73cdf81a543e1c385fb3c0e03992a21f73cb6332dd3a16fd5e08b94721a1fffeb8f430a83bf664589fb6c2d4c6af49c57412d17990db6a07815a1ce2c648817422f6806edadd7af6dc7e1feef18cfb343686a6f97bd726f547e2d46a9c655f399efda5a24374aeec54af09b0f8d59218ab779654e970913b897f17dbf0b35e8067e7c60c035e4e7f656b3d5804213a45f65b7021410086988d50c674203a9be5d37f03b630f6bb8761db2fe90df352ef268e20f496be7f474841e5b5e2c3744c690cdbf451274f0633923358520ec5de19a83d7b09dc2526bf9d4130e875cdc5a459390184bbcda711bf9825fb7fcd133f5e7446365eab6bd60c6a8c82035349e2afa33732c229d5bd378aff127dfb7063d00d2ab5889df3db7d5499cce57c03d3450f93105db8fb5494720bc9bb2932a65525d19e8f60c9666e77b8dedb63b934c03706aa3bbe95623231d5b8a9ccc6ba816349e47a1f7705dc46027cd1d9163f2815221dd52d9c43e6b22beba3b9fd9fdc76fc3a05723545c78ec12538efd131d38e3fcc176add71dd1983e61acd25e62cc219b0bac96f44edfd2a341559746b406503bb3d760e313156765935e7c41e3768cd281280eef8cb31b86c7ef04a18ccb122b05462891b6a65a0031e1651362a148f1cd02a472f56f159427f68bb80c3a8e5d9a677a21acd61e8d3aa87669dfbb1b4cde4c88e81f4c5ffc5457a593a81a901d4cd7944c666d7d38ffedd971a1a0f3910c5246196d25669d3c55c9f5469f1e30d249950cfecff028de8ff017035177c09b97246c269eb7267eb2b69f4935eb0bb327422ccb6d490f371dfe0b30d5fc9c6d1887e2b936be11e69553084a29bc77800b26f2ac6bc7f951ef15cd1926ae26c24d28b94fd3de3ddeba272f1d074a2f2ae5e01ec08ac45707efe63e4034d2f1b361efc279ebfefcc678ef01c768bacf72bb195dd64dcfeb73f49800b1249e0dae222bdf115abf2dbb87f76b1c3d9ac31d70ee59e028c2a8e0e87abc1af21aa93518ffbf823465653619e7e390c3617dd6b5f8fb25cbf058a8cb56f1700f4e9f6503ef502e13182137f906ad591a1f2bb897c2a69a1ddd3e32834a0d75b863fb05404b196bc1ccaa7044b3693e60e50605fdb5803da3ab86899a3664781e50bcf225b48ee112dd7785baea35ab9469c37d75083f65a9fd6f234fe6ab878e9851f569e4a3f2743669456cbc2806634928be0b745b5a6927e6f09e9b91091dd514015f48ddc7f6089651112c4a1d1357b3025203710170907aef71e48c817a213325377b47063c17b20e438332", 0x1000}, {&(0x7f0000001780)="76ad9cb813e59647889893e39718fb060170692b772237749d0904578b8104457c6087e66a4b33197a695b60f5328b013a1a41c44ad1cc3a1537ddfc97f5fdefdb20e2f01c911a73c61108784aafb15f6c296caa47daf86e31ad3f120af7c04b0176c5e703669579ac7fb33be923e5eda153c6874f59b6a3a42e3624d6d988e469422ed202bfc5c2fd8bd557160b8652b309aa6fabf05338d27c1552439f07", 0x9f}, {&(0x7f0000001840)="6d476065ff9f1820fb24c9f1c7e1480f065e278cc5a552c7c8e28ec517abe4288ab64b", 0x23}, {&(0x7f0000001880)="36571edd5dc9f9f5567b0525e280c006643bba93e230274ea85d966c47adb81fe6264129309b95d4f34b26be290fb9960e2ca5112ec26c85d55b676347b44f4b4fd00c4fb4083f4d0d8e357e714aa3a72e1dec9b2ec1d473860c965cd7e2ea31c68c1ed170b1302a07c98941363d2970f734908a7dfd7dbb2b20fb5f84d5962442051d1c3dccc7efa23d10a46a088f163a3f000940b26a80d12743ca8094aae3e125463fc32e96cef924a2a5f8", 0xad}, {&(0x7f0000001940)="3433771e5726bea80a11422067771b5f848da8f33ec8f331198241ed5436242af81773b9e8da6c04286902a59576e0abe09ed206c353eea6e0ee13bd75747e21d61126a97ee410f399e0d2acf9456904d7d511d558472913b12573a3220cdc191d7a0a871cbeaf00fa54318563852b4790fe721f0b0080e440cd12254e598a30a4a11177d5c405585169536624d20d28b95d135098bc5bbe7b3f3f0a56bbebb991bb8c35551851680c180390d9db728998ccb97da54c96e874e6557423ceeb8182d7", 0xc2}, {&(0x7f0000001a40)="8409e42c5acdfa42a6cda35f69191c0bf81fb1e0629c4266c0ed493285894f5fee6b3d9c3ef5248a015017afcd2297223cb96cf03b53baedb70947ece67dd1c0c773122f810a0cf02b78a02b8f936d51e327f9c34bd58df134b13196628a40e83cb7cf52fc735e7f6faaeb3c008fbe689939d92d951349808de4125920b0ddfe839ef01da6d517230aed2aa1894c0fcc63d2b14760672106afe90e330ef9e7aee02b9355dff77663e8cedaa5f3d12192a3116309a4c4dc75b6befec3a551b5be137c6b08ad15738a4ef9a350a0c6da689da64d6857c77bf2ea785ff08240a216af6840e605f68a1ac6682110af99e9", 0xef}, {&(0x7f0000001b40)="a8e3113ee5119ae2d6c5535f9b", 0xd}], 0xa, &(0x7f0000001c40)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x200}}, @txtime={{0x18, 0x1, 0x3d, 0x1ff}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x90}}, {{&(0x7f0000001d00)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x1, 0x2, 0x2}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001d80)="57290201006330ada4e8828d1ad50e9ca5552f15b2cd0bd60638bc0dc976df68edb4a6eb6e1ccbc586b028af514843", 0x2f}], 0x1, &(0x7f0000001e00)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x7fff}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0xc0}}], 0x3, 0x4000008) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 240.230494] FAULT_INJECTION: forcing a failure. [ 240.230494] name failslab, interval 1, probability 0, space 0, times 0 [ 240.262096] audit: type=1400 audit(1576231710.162:62): avc: denied { getrlimit } for pid=10857 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 [ 240.274182] CPU: 0 PID: 10858 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 240.293431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.293437] Call Trace: [ 240.293454] dump_stack+0x142/0x197 [ 240.293475] should_fail.cold+0x10f/0x159 [ 240.313207] should_failslab+0xdb/0x130 [ 240.313218] __kmalloc+0x2f0/0x7a0 [ 240.313228] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 240.313241] ? kobject_uevent_env+0x378/0xc23 [ 240.313251] ? rcu_read_lock_sched_held+0x110/0x130 [ 240.313263] ? kobject_get_path+0xbb/0x1a0 [ 240.340255] kobject_get_path+0xbb/0x1a0 [ 240.344335] ? devm_device_remove_groups+0x50/0x50 [ 240.349277] kobject_uevent_env+0x39c/0xc23 [ 240.353610] ? lock_downgrade+0x740/0x740 [ 240.357782] kobject_uevent+0x20/0x26 [ 240.361594] loop_clr_fd+0x4a7/0xae0 [ 240.365323] lo_ioctl+0x8ea/0x1ce0 [ 240.368875] ? SyS_mount+0xcf/0x120 [ 240.372508] ? loop_probe+0x160/0x160 [ 240.376313] blkdev_ioctl+0x96b/0x1860 [ 240.380212] ? blkpg_ioctl+0x980/0x980 [ 240.384113] ? __might_sleep+0x93/0xb0 [ 240.388014] ? __fget+0x210/0x370 [ 240.391481] block_ioctl+0xde/0x120 [ 240.395115] ? blkdev_fallocate+0x3b0/0x3b0 [ 240.399445] do_vfs_ioctl+0x7ae/0x1060 [ 240.403341] ? selinux_file_mprotect+0x5d0/0x5d0 [ 240.408102] ? lock_downgrade+0x740/0x740 [ 240.412286] ? ioctl_preallocate+0x1c0/0x1c0 [ 240.416708] ? __fget+0x237/0x370 [ 240.420336] ? security_file_ioctl+0x89/0xb0 [ 240.424766] SyS_ioctl+0x8f/0xc0 [ 240.428262] ? do_vfs_ioctl+0x1060/0x1060 [ 240.432421] do_syscall_64+0x1e8/0x640 [ 240.436312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.441165] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.446361] RIP: 0033:0x45a777 [ 240.449550] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 240.457367] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 240.464646] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 240.472012] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 10:08:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80060, 0x0) [ 240.480496] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 240.487770] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:30 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:30 executing program 1 (fault-call:2 fault-nth:53): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xc000, 0x7) [ 240.794019] FAULT_INJECTION: forcing a failure. [ 240.794019] name failslab, interval 1, probability 0, space 0, times 0 [ 240.806795] CPU: 0 PID: 10895 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 240.814711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.824178] Call Trace: [ 240.826777] dump_stack+0x142/0x197 [ 240.830445] should_fail.cold+0x10f/0x159 [ 240.834603] should_failslab+0xdb/0x130 [ 240.838588] kmem_cache_alloc_node_trace+0x280/0x770 [ 240.843701] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 240.846736] bridge0: port 3(gretap0) entered blocking state [ 240.849162] __kmalloc_node_track_caller+0x3d/0x80 [ 240.849178] __kmalloc_reserve.isra.0+0x40/0xe0 [ 240.849193] __alloc_skb+0xcf/0x500 [ 240.864171] bridge0: port 3(gretap0) entered disabled state [ 240.864501] ? skb_trim+0x180/0x180 [ 240.864513] ? netlink_has_listeners+0x20a/0x330 [ 240.864531] kobject_uevent_env+0x781/0xc23 [ 240.873860] kobject_uevent+0x20/0x26 [ 240.873874] loop_clr_fd+0x4a7/0xae0 [ 240.873889] lo_ioctl+0x8ea/0x1ce0 [ 240.873903] ? SyS_mount+0xcf/0x120 [ 240.873913] ? loop_probe+0x160/0x160 [ 240.886904] device gretap0 entered promiscuous mode [ 240.890377] blkdev_ioctl+0x96b/0x1860 [ 240.890396] ? blkpg_ioctl+0x980/0x980 [ 240.890415] ? __might_sleep+0x93/0xb0 [ 240.890425] ? __fget+0x210/0x370 [ 240.890440] block_ioctl+0xde/0x120 [ 240.890457] ? blkdev_fallocate+0x3b0/0x3b0 [ 240.906625] bridge0: port 3(gretap0) entered blocking state [ 240.910268] do_vfs_ioctl+0x7ae/0x1060 [ 240.910282] ? selinux_file_mprotect+0x5d0/0x5d0 [ 240.910292] ? lock_downgrade+0x740/0x740 [ 240.910304] ? ioctl_preallocate+0x1c0/0x1c0 [ 240.910316] ? __fget+0x237/0x370 [ 240.910333] ? security_file_ioctl+0x89/0xb0 [ 240.914371] bridge0: port 3(gretap0) entered forwarding state [ 240.918073] SyS_ioctl+0x8f/0xc0 [ 240.918083] ? do_vfs_ioctl+0x1060/0x1060 [ 240.918096] do_syscall_64+0x1e8/0x640 [ 240.918109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.947669] entry_SYSCALL_64_after_hwframe+0x42/0xb7 10:08:30 executing program 1 (fault-call:2 fault-nth:54): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 240.947680] RIP: 0033:0x45a777 [ 240.947686] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 240.947699] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 240.947704] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 240.947711] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 240.947716] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 240.947725] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:31 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) getpgrp(r39) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 241.170507] FAULT_INJECTION: forcing a failure. [ 241.170507] name failslab, interval 1, probability 0, space 0, times 0 [ 241.191374] CPU: 1 PID: 10915 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 241.199284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.199289] Call Trace: [ 241.199309] dump_stack+0x142/0x197 [ 241.199328] should_fail.cold+0x10f/0x159 [ 241.219022] should_failslab+0xdb/0x130 [ 241.223000] kmem_cache_alloc_node+0x287/0x780 [ 241.227592] __alloc_skb+0x9c/0x500 [ 241.231221] ? skb_trim+0x180/0x180 [ 241.231234] ? netlink_has_listeners+0x20a/0x330 [ 241.231252] kobject_uevent_env+0x781/0xc23 [ 241.231270] kobject_uevent+0x20/0x26 [ 241.231282] loop_clr_fd+0x4a7/0xae0 [ 241.231296] lo_ioctl+0x8ea/0x1ce0 [ 241.231308] ? SyS_mount+0xcf/0x120 [ 241.231319] ? loop_probe+0x160/0x160 [ 241.231333] blkdev_ioctl+0x96b/0x1860 [ 241.231342] ? blkpg_ioctl+0x980/0x980 [ 241.231360] ? __might_sleep+0x93/0xb0 [ 241.231369] ? __fget+0x210/0x370 [ 241.231383] block_ioctl+0xde/0x120 [ 241.231392] ? blkdev_fallocate+0x3b0/0x3b0 [ 241.231404] do_vfs_ioctl+0x7ae/0x1060 [ 241.289483] ? selinux_file_mprotect+0x5d0/0x5d0 [ 241.294251] ? lock_downgrade+0x740/0x740 [ 241.298414] ? ioctl_preallocate+0x1c0/0x1c0 [ 241.302837] ? __fget+0x237/0x370 [ 241.306302] ? security_file_ioctl+0x89/0xb0 [ 241.310720] SyS_ioctl+0x8f/0xc0 [ 241.314087] ? do_vfs_ioctl+0x1060/0x1060 [ 241.318237] do_syscall_64+0x1e8/0x640 [ 241.322132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.326982] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 241.332176] RIP: 0033:0x45a777 [ 241.335361] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.343073] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 241.350346] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 241.357671] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 241.364961] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 241.372239] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:31 executing program 2: exit_group(0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="9a6f64656c616c6c6f632c7365636c5462656c4c00"]) 10:08:31 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:31 executing program 1 (fault-call:2 fault-nth:55): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) acct(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x80, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="9af8fd11addd864f79e0582d8778243dca126f041c98526e80cf0748c961142784a267f889c680859ed23409c09c28d658405fac3557a4d6ea9d07ce412e3248f15a2b625a862c8a196794f559e68fba1f3e3ae831635874f661631c7e23220a992427998d11e80c6ae7933487c4ca6a5003e55591406d55d405462bb3faca664355cafdd89b15f6422d08e2e35479af43cdc1d89d0ca6251fb2562b52cf3082f78af5cbb1d4357755b08fafbc0893d5a4", 0xb1, 0x2}], 0x280024, &(0x7f00000002c0)={[{@integrity='integrity'}, {@grpquota='grpquota'}, {@errors_remount='errors=remount-ro'}, {@usrquota='usrquota'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'seclabel'}}, {@subj_user={'subj_user', 0x3d, '*em0security'}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, 'securityppp0$em0\'mime_type-*]proccpusetvmnet0'}}, {@dont_appraise='dont_appraise'}, {@uid_lt={'uid<', r1}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 241.700766] FAULT_INJECTION: forcing a failure. [ 241.700766] name failslab, interval 1, probability 0, space 0, times 0 [ 241.746242] CPU: 0 PID: 10938 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 241.754170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.763532] Call Trace: [ 241.766136] dump_stack+0x142/0x197 [ 241.769809] should_fail.cold+0x10f/0x159 [ 241.773974] should_failslab+0xdb/0x130 [ 241.777959] kmem_cache_alloc_node_trace+0x280/0x770 [ 241.783080] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 241.788640] __kmalloc_node_track_caller+0x3d/0x80 [ 241.793577] __kmalloc_reserve.isra.0+0x40/0xe0 [ 241.798255] __alloc_skb+0xcf/0x500 [ 241.801886] ? skb_trim+0x180/0x180 [ 241.805514] ? netlink_has_listeners+0x20a/0x330 [ 241.810275] kobject_uevent_env+0x781/0xc23 [ 241.814598] ? lock_downgrade+0x740/0x740 [ 241.818769] kobject_uevent+0x20/0x26 [ 241.822640] loop_clr_fd+0x4a7/0xae0 [ 241.826372] lo_ioctl+0x8ea/0x1ce0 [ 241.829931] ? SyS_mount+0xcf/0x120 [ 241.833569] ? loop_probe+0x160/0x160 [ 241.837385] blkdev_ioctl+0x96b/0x1860 [ 241.841279] ? blkpg_ioctl+0x980/0x980 [ 241.845178] ? __might_sleep+0x93/0xb0 [ 241.849074] ? __fget+0x210/0x370 [ 241.852537] block_ioctl+0xde/0x120 [ 241.856183] ? blkdev_fallocate+0x3b0/0x3b0 [ 241.860511] do_vfs_ioctl+0x7ae/0x1060 [ 241.864405] ? selinux_file_mprotect+0x5d0/0x5d0 [ 241.869168] ? lock_downgrade+0x740/0x740 [ 241.873329] ? ioctl_preallocate+0x1c0/0x1c0 [ 241.877804] ? __fget+0x237/0x370 [ 241.881269] ? security_file_ioctl+0x89/0xb0 [ 241.885692] SyS_ioctl+0x8f/0xc0 [ 241.889068] ? do_vfs_ioctl+0x1060/0x1060 [ 241.893226] do_syscall_64+0x1e8/0x640 [ 241.897207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.902074] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 241.907274] RIP: 0033:0x45a777 [ 241.911024] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.918748] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 241.926023] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 241.933305] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 241.940586] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 241.947859] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:32 executing program 1 (fault-call:2 fault-nth:56): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:32 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) getpgrp(r39) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 242.215852] EXT4-fs: 20 callbacks suppressed [ 242.215860] EXT4-fs (sda1): re-mounted. Opts: [ 242.281956] FAULT_INJECTION: forcing a failure. [ 242.281956] name failslab, interval 1, probability 0, space 0, times 0 [ 242.308168] CPU: 0 PID: 10958 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 242.316107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.325475] Call Trace: [ 242.328094] dump_stack+0x142/0x197 [ 242.331745] should_fail.cold+0x10f/0x159 [ 242.335907] should_failslab+0xdb/0x130 [ 242.339894] kmem_cache_alloc_node_trace+0x280/0x770 [ 242.345111] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 242.350670] __kmalloc_node_track_caller+0x3d/0x80 [ 242.355620] __kmalloc_reserve.isra.0+0x40/0xe0 [ 242.360303] __alloc_skb+0xcf/0x500 [ 242.363936] ? skb_trim+0x180/0x180 [ 242.367565] ? netlink_has_listeners+0x20a/0x330 [ 242.372333] kobject_uevent_env+0x781/0xc23 [ 242.376663] ? lock_downgrade+0x740/0x740 [ 242.380832] kobject_uevent+0x20/0x26 [ 242.384638] loop_clr_fd+0x4a7/0xae0 [ 242.388362] lo_ioctl+0x8ea/0x1ce0 [ 242.391914] ? SyS_mount+0xcf/0x120 [ 242.395549] ? loop_probe+0x160/0x160 [ 242.399361] blkdev_ioctl+0x96b/0x1860 [ 242.403341] ? blkpg_ioctl+0x980/0x980 [ 242.403362] ? __might_sleep+0x93/0xb0 [ 242.403373] ? __fget+0x210/0x370 [ 242.403390] block_ioctl+0xde/0x120 [ 242.403401] ? blkdev_fallocate+0x3b0/0x3b0 [ 242.403411] do_vfs_ioctl+0x7ae/0x1060 [ 242.403424] ? selinux_file_mprotect+0x5d0/0x5d0 [ 242.431444] ? lock_downgrade+0x740/0x740 [ 242.435606] ? ioctl_preallocate+0x1c0/0x1c0 [ 242.440014] ? __fget+0x237/0x370 [ 242.443469] ? security_file_ioctl+0x89/0xb0 [ 242.447891] SyS_ioctl+0x8f/0xc0 [ 242.451251] ? do_vfs_ioctl+0x1060/0x1060 [ 242.455399] do_syscall_64+0x1e8/0x640 [ 242.459302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.464135] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 242.469316] RIP: 0033:0x45a777 [ 242.472489] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:08:32 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) getpgrp(r39) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 242.480190] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 242.487444] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 242.494697] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 242.501956] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 242.509210] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 [ 242.643637] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:32 executing program 1 (fault-call:2 fault-nth:57): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x19) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000100)={{0x1, 0x0, 0x3, 0x287, 'syz0\x00', 0x7}, 0x6, 0x40, 0xb7e, r1, 0x3, 0xffffffd4, 'syz1\x00', &(0x7f0000000040)=['seclabel', 'i_version', 'i_version'], 0x1a, [], [0x101, 0xffff, 0x80, 0x7]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$inet6(0xa, 0xa, 0x6) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 242.768875] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 242.791991] EXT4-fs (sda1): re-mounted. Opts: [ 242.842755] FAULT_INJECTION: forcing a failure. [ 242.842755] name failslab, interval 1, probability 0, space 0, times 0 10:08:32 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r5 = dup3(r3, r4, 0x0) write$input_event(r5, &(0x7f0000000000)={{0x77359400}}, 0x18) write$P9_RSTAT(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="700000007d0200000069000700050000000100000000040000000000000800000004180000000300000007000000000000000b0028747275737465646c6f40180073797374656d707070302d76626f786e65743170726f63180700697036677265000c002d76626f786e6574312a7d40"], 0x70) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000080)={r6}) ioctl$DRM_IOCTL_RM_CTX(r5, 0xc0086421, &(0x7f00000002c0)={r6, 0x5}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000000)={r6, &(0x7f0000000540)=""/4096}) getpriority(0x1, r1) [ 242.888046] CPU: 0 PID: 10981 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 242.896115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.905485] Call Trace: [ 242.908082] dump_stack+0x142/0x197 [ 242.911733] should_fail.cold+0x10f/0x159 [ 242.915899] should_failslab+0xdb/0x130 [ 242.915912] kmem_cache_alloc_node+0x287/0x780 [ 242.915934] __alloc_skb+0x9c/0x500 [ 242.915947] ? skb_trim+0x180/0x180 [ 242.928099] ? netlink_has_listeners+0x20a/0x330 [ 242.928116] kobject_uevent_env+0x781/0xc23 [ 242.928138] kobject_uevent+0x20/0x26 [ 242.928149] loop_clr_fd+0x4a7/0xae0 [ 242.928162] lo_ioctl+0x8ea/0x1ce0 [ 242.951877] ? SyS_mount+0xcf/0x120 [ 242.955516] ? loop_probe+0x160/0x160 [ 242.959332] blkdev_ioctl+0x96b/0x1860 [ 242.963227] ? blkpg_ioctl+0x980/0x980 [ 242.967130] ? __might_sleep+0x93/0xb0 [ 242.971043] ? __fget+0x210/0x370 [ 242.974502] block_ioctl+0xde/0x120 [ 242.978134] ? blkdev_fallocate+0x3b0/0x3b0 [ 242.982459] do_vfs_ioctl+0x7ae/0x1060 [ 242.986354] ? selinux_file_mprotect+0x5d0/0x5d0 [ 242.991112] ? lock_downgrade+0x740/0x740 [ 242.995272] ? ioctl_preallocate+0x1c0/0x1c0 [ 242.999689] ? __fget+0x237/0x370 [ 243.003152] ? security_file_ioctl+0x89/0xb0 [ 243.007575] SyS_ioctl+0x8f/0xc0 [ 243.010945] ? do_vfs_ioctl+0x1060/0x1060 [ 243.015097] do_syscall_64+0x1e8/0x640 [ 243.018987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.023843] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 243.029032] RIP: 0033:0x45a777 10:08:33 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) getpgrp(r39) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 243.032218] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.039926] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 243.047180] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 243.054433] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 243.061689] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 243.068941] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:33 executing program 1 (fault-call:2 fault-nth:58): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 243.212959] EXT4-fs (sda1): re-mounted. Opts: [ 243.261903] FAULT_INJECTION: forcing a failure. [ 243.261903] name failslab, interval 1, probability 0, space 0, times 0 [ 243.286063] CPU: 0 PID: 11009 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 243.294004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.303454] Call Trace: [ 243.306112] dump_stack+0x142/0x197 [ 243.309754] should_fail.cold+0x10f/0x159 [ 243.313916] should_failslab+0xdb/0x130 [ 243.317896] kmem_cache_alloc_node+0x287/0x780 [ 243.322493] __alloc_skb+0x9c/0x500 [ 243.326129] ? skb_trim+0x180/0x180 [ 243.329763] ? netlink_has_listeners+0x20a/0x330 [ 243.334536] kobject_uevent_env+0x781/0xc23 [ 243.338869] kobject_uevent+0x20/0x26 [ 243.342672] loop_clr_fd+0x4a7/0xae0 [ 243.346395] lo_ioctl+0x8ea/0x1ce0 [ 243.349952] ? SyS_mount+0xcf/0x120 [ 243.353583] ? loop_probe+0x160/0x160 [ 243.357388] blkdev_ioctl+0x96b/0x1860 [ 243.361281] ? blkpg_ioctl+0x980/0x980 [ 243.365332] ? __might_sleep+0x93/0xb0 [ 243.369224] ? __fget+0x210/0x370 [ 243.372694] block_ioctl+0xde/0x120 [ 243.376328] ? blkdev_fallocate+0x3b0/0x3b0 [ 243.380659] do_vfs_ioctl+0x7ae/0x1060 [ 243.384556] ? selinux_file_mprotect+0x5d0/0x5d0 [ 243.389316] ? lock_downgrade+0x740/0x740 [ 243.393472] ? ioctl_preallocate+0x1c0/0x1c0 [ 243.397894] ? __fget+0x237/0x370 [ 243.401356] ? security_file_ioctl+0x89/0xb0 [ 243.405778] SyS_ioctl+0x8f/0xc0 [ 243.409153] ? do_vfs_ioctl+0x1060/0x1060 [ 243.413304] do_syscall_64+0x1e8/0x640 [ 243.417194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.422041] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 243.427412] RIP: 0033:0x45a777 [ 243.430596] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.438309] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 243.445578] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 243.452850] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 243.460131] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 243.467401] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000100)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x200000) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)={0x8000, 0x8, 0x400, 0x8}) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) 10:08:33 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) getpgrp(r39) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) fanotify_mark(r0, 0x28, 0xc, r1, &(0x7f0000000040)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@seclabel='seclabel'}]}) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x1) ioctl$SNDCTL_DSP_GETODELAY(r2, 0x80045017, &(0x7f0000000140)) 10:08:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0xa, @sdr={0x41495043, 0x9}}) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r1) ptrace(0x4207, r1) [ 243.837215] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 243.856413] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value 10:08:33 executing program 1 (fault-call:2 fault-nth:59): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 243.902894] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:33 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) ptrace$pokeuser(0x6, 0x0, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 243.993309] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value 10:08:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000140)=ANY=[@ANYBLOB="6175fe58b21369f5670b6c6f633d3078303030303030303030303030303030302c7375626a5f757365723d6b657972696e67002c0037c73e4c5a855fa6bbbac6726af4f2e55456f0739b2635"]) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000040)={r2}, 0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r2, 0x8, 0x1000}, &(0x7f0000000100)=0x8) [ 244.083550] EXT4-fs (sda1): re-mounted. Opts: [ 244.120500] FAULT_INJECTION: forcing a failure. [ 244.120500] name failslab, interval 1, probability 0, space 0, times 0 [ 244.136777] CPU: 0 PID: 11052 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 244.144864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.154388] Call Trace: [ 244.156979] dump_stack+0x142/0x197 [ 244.160594] should_fail.cold+0x10f/0x159 [ 244.164738] should_failslab+0xdb/0x130 [ 244.168708] kmem_cache_alloc_node_trace+0x280/0x770 [ 244.173810] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 244.179266] __kmalloc_node_track_caller+0x3d/0x80 [ 244.184193] __kmalloc_reserve.isra.0+0x40/0xe0 [ 244.188984] __alloc_skb+0xcf/0x500 [ 244.192623] ? skb_trim+0x180/0x180 [ 244.196254] ? netlink_has_listeners+0x20a/0x330 [ 244.201022] kobject_uevent_env+0x781/0xc23 [ 244.205359] kobject_uevent+0x20/0x26 [ 244.209165] loop_clr_fd+0x4a7/0xae0 [ 244.212889] lo_ioctl+0x8ea/0x1ce0 [ 244.216438] ? SyS_mount+0xcf/0x120 [ 244.220070] ? loop_probe+0x160/0x160 [ 244.223872] blkdev_ioctl+0x96b/0x1860 [ 244.223883] ? blkpg_ioctl+0x980/0x980 [ 244.223903] ? __might_sleep+0x93/0xb0 [ 244.223914] ? __fget+0x210/0x370 [ 244.223929] block_ioctl+0xde/0x120 [ 244.223941] ? blkdev_fallocate+0x3b0/0x3b0 [ 244.223950] do_vfs_ioctl+0x7ae/0x1060 [ 244.223962] ? selinux_file_mprotect+0x5d0/0x5d0 [ 244.231717] ? lock_downgrade+0x740/0x740 [ 244.231733] ? ioctl_preallocate+0x1c0/0x1c0 [ 244.231746] ? __fget+0x237/0x370 [ 244.231766] ? security_file_ioctl+0x89/0xb0 [ 244.231777] SyS_ioctl+0x8f/0xc0 [ 244.231787] ? do_vfs_ioctl+0x1060/0x1060 [ 244.231800] do_syscall_64+0x1e8/0x640 [ 244.231809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.231827] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 244.231836] RIP: 0033:0x45a777 [ 244.231848] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.304486] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 244.311752] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 10:08:34 executing program 1 (fault-call:2 fault-nth:60): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 244.319008] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 244.326272] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 244.333583] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000100)="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", 0xfb, 0x200}], 0x1020020, &(0x7f00000002c0)={[{@orlov='orlov'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@nodelalloc='nodelalloc'}], [{@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}]}) 10:08:34 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) getpgrp(r39) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 244.543856] FAULT_INJECTION: forcing a failure. [ 244.543856] name failslab, interval 1, probability 0, space 0, times 0 [ 244.555755] CPU: 1 PID: 11070 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 [ 244.564012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.564019] Call Trace: [ 244.564040] dump_stack+0x142/0x197 [ 244.564059] should_fail.cold+0x10f/0x159 [ 244.564080] should_failslab+0xdb/0x130 [ 244.564091] kmem_cache_alloc_node+0x287/0x780 [ 244.564113] __alloc_skb+0x9c/0x500 [ 244.564124] ? skb_trim+0x180/0x180 [ 244.564137] ? netlink_has_listeners+0x20a/0x330 [ 244.564150] kobject_uevent_env+0x781/0xc23 [ 244.564170] kobject_uevent+0x20/0x26 [ 244.564182] loop_clr_fd+0x4a7/0xae0 [ 244.564197] lo_ioctl+0x8ea/0x1ce0 [ 244.564214] ? loop_probe+0x160/0x160 [ 244.564226] blkdev_ioctl+0x96b/0x1860 [ 244.564236] ? blkpg_ioctl+0x980/0x980 [ 244.564253] ? __might_sleep+0x93/0xb0 [ 244.564264] ? __fget+0x210/0x370 [ 244.639290] block_ioctl+0xde/0x120 [ 244.643027] ? blkdev_fallocate+0x3b0/0x3b0 [ 244.647340] do_vfs_ioctl+0x7ae/0x1060 [ 244.651216] ? selinux_file_mprotect+0x5d0/0x5d0 [ 244.655954] ? lock_downgrade+0x740/0x740 [ 244.660087] ? ioctl_preallocate+0x1c0/0x1c0 [ 244.664496] ? __fget+0x237/0x370 [ 244.667946] ? security_file_ioctl+0x89/0xb0 [ 244.672338] SyS_ioctl+0x8f/0xc0 [ 244.675686] ? do_vfs_ioctl+0x1060/0x1060 [ 244.679820] do_syscall_64+0x1e8/0x640 [ 244.683689] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.688566] entry_SYSCALL_64_after_hwframe+0x42/0xb7 10:08:34 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() futex(&(0x7f0000000040), 0x1, 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000)=0x8, 0x2) ptrace(0x4206, r0) ptrace(0x4207, r0) [ 244.693736] RIP: 0033:0x45a777 [ 244.696909] RSP: 002b:00007fd7d64c6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.704687] RAX: ffffffffffffffda RBX: 00007fd7d64c6c90 RCX: 000000000045a777 [ 244.711942] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 244.719193] RBP: 000000000075bf20 R08: 00007fd7d64c6b40 R09: 00007fd7d64c6ae0 [ 244.726448] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fd7d64c76d4 [ 244.733699] R13: 00000000004cad45 R14: 00000000004e4228 R15: 0000000000000003 10:08:34 executing program 1 (fault-call:2 fault-nth:61): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 244.795158] SELinux: security_context_str_to_sid(user_u) failed for (dev sda1, type ext4) errno=-22 10:08:34 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) ptrace$pokeuser(0x6, 0x0, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file1\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d3078303030303030303030303030303030302c737500015f757365723d6b6572696e67002c0000"]) 10:08:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) r1 = accept$netrom(r0, &(0x7f0000000600)={{}, [@bcast, @bcast, @rose, @rose, @bcast, @null, @remote, @default]}, &(0x7f0000000680)=0x48) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000100)={0x62, "b11801c657e1ed798f210af1b41459e15ef7410052f3e98eef24a5f5cef7c72b5fd1f1f364cb85c307afc977d8ca4f33a46db93327799d7f02104f4cf8a2dd19595ad2c55574b4eb3fc16d8668820c350c3552a6432a52d5f0176ae97ce50854949a"}) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) renameat(r0, &(0x7f0000000380)='./file0\x00', r0, &(0x7f00000003c0)='./file0\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000001c0)={r2, &(0x7f0000000100)=""/153}) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x20000, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) r0 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x1a3800) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000340)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0xd3, &(0x7f0000000080)=""/83, &(0x7f0000000100)=0x53) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffe000/0x1000)=nil) 10:08:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3211841, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00'/10]) 10:08:35 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) ptrace$pokeuser(0x6, 0x0, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="7365636c61000000000043ea8b45961cea139a7bfa22a2ad1d7b93c386e8b99b93070023185c54adf6ead0d128291ebb1ca9f08ed058bf7927ea"]) 10:08:35 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) rt_tgsigqueueinfo(r0, r1, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000080)=0x3, 0x4) ptrace(0x4207, r0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_rr_get_interval(r3, &(0x7f00000000c0)) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x1, 0x1, 0x666, 0x100005}, 0x76c93eef6b64ec79) tkill(r4, 0x8) 10:08:35 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r1 = getpid() r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101040, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x80\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000080)=""/31, 0x1f, 0x8, 0x7, 0xfffffffa, 0x2, 0xfffffe44}, 0x120) rt_tgsigqueueinfo(r1, r1, 0x4080000000000016, &(0x7f00000004c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x141000) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f00000001c0)=0x5, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ptrace(0x4206, r1) r5 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f00000008c0)={0x101, {{0x2, 0x4e21, @local}}}, 0x88) ptrace(0x4207, r1) prlimit64(r1, 0x10968c25d7f03d39, &(0x7f0000000380)={0x0, 0x200}, &(0x7f00000003c0)) 10:08:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2131081, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB='seclaPel,\x00']) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r0, r1, r1}, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r1) 10:08:35 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) ptrace$pokeuser(0x6, 0x0, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:35 executing program 2: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file1\x00', 0x0, 0x2200400, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:35 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f0000000100)=0xe, 0x0) fcntl$setpipe(r2, 0x407, 0x0) r3 = socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000000)=0xd1ae40e98f639b36, 0x2) write(r2, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_DSP_NONBLOCK(0xffffffffffffffff, 0x500e, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1, 0xffffffffffffffd3, 0x0, 0x22a2022, &(0x7f0000001340)=ANY=[]) 10:08:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8102, 0x0) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x5) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) fcntl$getflags(r1, 0x40a) write(r0, &(0x7f0000000340), 0x41395527) recvfrom$unix(r0, &(0x7f0000000100)=""/169, 0xa9, 0x10000, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) 10:08:36 executing program 0: 10:08:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000002c0)=""/187, 0xffffffffffffff5e, 0x400022f2, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e20}, 0x6e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x8040, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)) 10:08:36 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) r2 = dup2(0xffffffffffffffff, r0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f00000000c0)=0x1) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x4080000000000016, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000440)={r0}) accept$ax25(r4, &(0x7f0000000380)={{0x3, @bcast}, [@default, @null, @null, @bcast, @remote, @default, @netrom, @default]}, &(0x7f0000000080)=0xfffffffffffffdb5) ptrace(0x4206, r3) ptrace(0x4207, r3) 10:08:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) pipe2(0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000280)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) dup3(0xffffffffffffffff, r0, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'netpci0\x00', 0x400}) 10:08:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='coda\x00', 0x0, &(0x7f0000000140)='seclabel') syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x200020, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendto$unix(r1, &(0x7f0000000100)="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", 0xfe, 0x40, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000080)={0x176, 0x29, 0x4, {0x3ff}}, 0x2a) 10:08:36 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) r39 = getpgrp(0x0) ptrace$pokeuser(0x6, r39, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000080)={0xc029, 0x36a959c6535a107a}) 10:08:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) pipe2(0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000280)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) dup3(0xffffffffffffffff, r0, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'netpci0\x00', 0x400}) 10:08:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xcca51b1316bd6271, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000100)=""/195) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x280002c, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) 10:08:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 10:08:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x6454f9df70ff63eb, 0xfffff57a, 0xf1, 0x8}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 247.237340] EXT4-fs: 27 callbacks suppressed [ 247.237394] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 10:08:37 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f0000000000)) ptrace(0x4206, r0) ptrace(0x4207, r0) [ 247.438306] EXT4-fs (sda1): re-mounted. Opts: 10:08:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="7365636cfc9ad3c92c00"]) 10:08:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00') preadv(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200)=0x5, 0x4) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r12, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="020000000177090000000000040000000000000008000000", @ANYRES32=r16, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r16, @ANYBLOB="1000080000008000000057b30438bbf107bc16250000005719bf86b0ebc45ac4a65914053a17912faa2849c4d72e63"], 0x34, 0x0) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r18) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000880)={0x350, 0x0, 0x8, [{{0x2, 0x2, 0x6, 0x6, 0x8001, 0xa0, {0x4, 0x5, 0x8, 0x4, 0xffff, 0xfffffffffffffff8, 0x3ff, 0x80, 0x4, 0x10000, 0x55f, r3, r5, 0x4, 0xffff}}, {0x4, 0x6, 0x5, 0x7, 'syz0\x00'}}, {{0x6, 0x2, 0x1, 0x100000001, 0xffffff80, 0x688e, {0x5, 0x7, 0xfff, 0x96, 0x3, 0xfffffffffffffffe, 0x401, 0xe2, 0x9, 0x6, 0x2, r18, r6, 0x4, 0x1}}, {0x6, 0x3, 0x8, 0x8, 'ip6gre0\x00'}}, {{0x5, 0x2, 0x2, 0xb8a, 0x5, 0x7, {0x6, 0x0, 0x80, 0x7, 0x2, 0x8000, 0x5, 0xfff, 0x6, 0x8, 0x8, r7, r9, 0x4, 0xffff}}, {0x2, 0xef08, 0x8, 0x1000, '[trusted'}}, {{0x6, 0x2, 0x5e6, 0x4, 0x0, 0x2, {0x1, 0xff, 0x5, 0x2, 0x4, 0x20000009, 0x700, 0x5, 0x8, 0x4, 0x6, r10, r12, 0xffffffff, 0x200}}, {0x0, 0x1ff, 0x14, 0x3, 'mime_typeGPL$system}'}}, {{0x0, 0x3, 0xf, 0x8, 0xcd, 0x200, {0x1, 0xffffffff, 0x1, 0x9, 0x7fff, 0x0, 0x80000000, 0x8000, 0x2, 0xffff, 0x4, r14, r16, 0x10001, 0xff}}, {0x6, 0x2, 0x12, 0x3, ']/ppp1ppp1#trusted'}}]}, 0x350) r19 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00') preadv(r19, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r19, 0x84, 0xc, &(0x7f0000000200)=0x5, 0x4) r20 = dup2(0xffffffffffffffff, r19) r21 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r22) r23 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r24, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r24, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r25 = getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = getuid() r28 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r29, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r29, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) r31 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r32, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r33 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r34) r35 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r35, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r36, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r36, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) write$FUSE_DIRENTPLUS(r20, &(0x7f0000000c00)={0x360, 0x0, 0x8, [{{0x2, 0x2, 0x6, 0x6, 0x0, 0xa0, {0x4, 0x5, 0x8, 0x4, 0xffff, 0xfffffffffffffff8, 0x3ff, 0x80, 0x4, 0x10000, 0x55f, r22, r24, 0x4, 0xffff}}, {0x4, 0x6, 0x5, 0x7, 'syz0\x00'}}, {{0x6, 0x2, 0x1, 0x100000001, 0xffffff80, 0x688e, {0x5, 0x7, 0xfff, 0x96, 0x3, 0xfffffffffffffffe, 0x401, 0xe2, 0x9, 0x6, 0x1, r25, r26, 0x4, 0x1}}, {0x6, 0x3, 0x8, 0x8, 'ip6gre0\x00'}}, {{0x5, 0x2, 0x2, 0xb8a, 0x5, 0x7, {0x6, 0x0, 0x80, 0x7, 0x2, 0x8000, 0x5, 0xfff, 0x6, 0x8, 0x8, r27, r29, 0x4, 0xffff}}, {0x2, 0xef08, 0x14, 0x1000, 'mime_typeGPL$system}'}}, {{0x6, 0x2, 0x5e6, 0x4, 0x0, 0x2, {0x1, 0xff, 0x5, 0x2, 0x4, 0x9, 0x700, 0x5, 0x8, 0x4, 0x6, r30, r32, 0xffffffff, 0x200}}, {0x0, 0x1ff, 0x14, 0x3, 'mime_typeGPL$system}'}}, {{0x0, 0x3, 0xc, 0x8, 0xcd, 0x200, {0x1, 0xffffffff, 0x1, 0x9, 0x7fff, 0x0, 0x80000000, 0x7ffd, 0x2, 0xffff, 0x4, r34, r36, 0x10001, 0xff}}, {0x6, 0x2, 0x12, 0x2, ']/ppp1ppp1#trusted'}}]}, 0x360) getgroups(0x0, &(0x7f0000000100)) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="7265736769643dc4ba10c154acc2149930f9800a68dd1925da562af5459adf61a681a7d0223080354e8037a675b952408c4b6311165c11948298271172920a4d302b4a954e42c6a162f306d848853c046ec3dca00f1e858a88f84efdcefc6a3dcc403512c877b60d421704ea6c7a4042635f0a98630c3635b07be1fb82405026616ff1be761bf3e9628ea2d7a3b62cb3", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) 10:08:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) [ 247.624902] EXT4-fs (sda1): Unrecognized mount option "seclüšÓÉ" or missing value 10:08:37 executing program 2: mkdir(&(0x7f0000000000)='./file1\x00', 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)=ANY=[@ANYBLOB="695f76257273696f6e2c7365636c6162656c2c0054f7daa96a06e206ec952343ddc266a9b8fbb151dd3f8e0f16eb3c4b21e19b74135565120e4d32566ace390a4bfe545b9023a0407850f358dc588f60af40f72e3ac3df88d13b8345f0b94388025eb3f1b6b7e60ce7dfe050a80c2aed385531907cf3c2e9194325ce9f69a91623ccb95c23d3fc48d3a3b1582dce21db1f1c17f89bb56af3e3c4d3c1049d3848915a89dcb08a164c521531d1f27207c60e31315e18f4b71cb3d2d2469913ca72a81ddedeeedb4198f751997aaa1b2316712dbc4b85d1e56eb50c56c8bfc8e021ce3bed22ff1d399b6469ca16f9ddc1ba4fa566667514"]) [ 247.702582] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 247.727954] EXT4-fs (sda1): Unrecognized mount option "seclüšÓÉ" or missing value 10:08:37 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) r39 = getpgrp(0x0) ptrace$pokeuser(0x6, r39, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:37 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x101880, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000100)}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200060, 0xcc) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x22a413, &(0x7f0000000500)=ANY=[@ANYBLOB='qeota,\x00']) 10:08:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x8, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0xc) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 10:08:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10080, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000100)=""/193) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) write$binfmt_misc(r1, &(0x7f00000003c0)={'syz0', "9bf1b07e51e6e79a54510e066e0714a1d2807bdddcc293c3163522a76cc034112f82821251525b40d4f189b5d3e38295d5a635fc790fb57347771b1e73c7d6a7fadb3f16a0643a7e647e41186b13b26c345fdc98e3a05ffa2ac7eb355c1d3700ccd4fe244b90d9dd91c09d70542b8f7089eb03a0380de5051b5d76bb41c45ae231e3ad45322e5444005e446456c3a0685a1def2879b813ae7e8dd61b7b07a91aa5ee1d4f5c65dcba06950325b10616e5ce812cad166eadb46e8045d526841ac0ab9b2c8866ace4e35e9e80ced171f29e1c345a0557d5c90c5f46ab07ab67733940da9741"}, 0xe8) fcntl$setstatus(r0, 0x4, 0x400) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="09012c00"]) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0xb2df, @empty, 0x1ff}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x8, @remote, 0x4}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e21, 0x5, @local, 0xa3}, @in6={0xa, 0x4e22, 0x2f79, @loopback, 0x9}, @in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x2a}, 0x8}, @in6={0xa, 0x4e20, 0x20, @dev={0xfe, 0x80, [], 0x26}, 0x1}, @in6={0xa, 0x4e24, 0x1000, @remote, 0x9}, @in={0x2, 0x4e21, @multicast2}], 0xf4) 10:08:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x8, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0xc) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) [ 247.923983] EXT4-fs (sda1): Unrecognized mount option "i_v%rsion" or missing value 10:08:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 10:08:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 248.018413] EXT4-fs (sda1): Unrecognized mount option " " or missing value [ 248.081491] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 248.146057] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:38 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x108200}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)={0x1b8, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x167}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4e92df00}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff6c}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4760}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1234}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa5}]}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd988}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2be}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4000007}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x50}, 0x8000) write$P9_RXATTRWALK(r1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000080), 0x8) ptrace(0x4207, r0) rt_sigtimedwait(&(0x7f0000000000)={0x400000}, 0x0, &(0x7f0000000040)={0x77359400}, 0x8) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000380), 0x4) 10:08:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x2480, 0x0) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x105) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x8010, r0, 0x100000001) 10:08:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="18000000350029082000000000000000030000001800000014000100ffff000000b8fafff13c3be822c7eb3356e9af80ac61275aa531ba54ba7d1d437322e067f34d158b619020c9fa8600bb226159f74fd8d880ac9a7d9efc1f45d8f1f79a22926584a55c509843dcb4a1a311e34fbfcb09eecf"], 0x2c}, 0x1, 0xffffff7f0e000000}, 0x0) 10:08:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="695f76657273696f6e2c7365636c6162656c2c00e10647ce3a576d978418fff3"]) [ 248.244277] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000600)="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", 0x4000, 0x1200) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) read(r2, &(0x7f0000000000)=""/81, 0xffffffd5) [ 248.377169] audit: type=1804 audit(1576231718.272:63): pid=11445 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir393673417/syzkaller.u4ouwF/138/memory.events" dev="sda1" ino=16838 res=1 [ 248.418165] audit: type=1800 audit(1576231718.272:64): pid=11445 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="memory.events" dev="sda1" ino=16838 res=0 10:08:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0xaf, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="646174613d777202f56974656261636b2c64651e035ce4e4edd16590e9e0dba1ebc5656275675f77616e745f65787472615f6973697a653d3078303030303030303030303030303030382c6a6f75726e616c5f6173796e635f636f6d6d69742c6572726f0375626a5f757365723d6b657972696e6700"]) 10:08:38 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x1}]}}}]}, 0x44}}, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) 10:08:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x1af, 0x200000) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000240)="5e77e0f1a5cb04c275b696cf289b4f1f98c9a421516d76c938c9932184e6ee9e0d0db4c20b9ad0e9370bef3fcc7ceceb0edfcd", 0x33) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fb4b004e0bf0b123a523127b58e461bb825bc258dcb2c89d67de48c89e4baad5494bb5bfff567f8497a86f8ee00621c067a7eeaad463e66638952fd4bc1bdefcd7359e8023e90000"], 0x4b, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)={[{@nodelalloc='nodelalloc'}], [{@fsname={'fsname', 0x3d, '-'}}]}) 10:08:38 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) r39 = getpgrp(0x0) ptrace$pokeuser(0x6, r39, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="7365636ce3c6b9456162806c2c00"]) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x880002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c40)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000004d40)=0xe8) sendmmsg$inet6(r0, &(0x7f0000008740)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0x100, @remote, 0x3}, 0x1c, &(0x7f0000001740)=[{&(0x7f0000000140)="9ea1009f6e1fa6c4fd0e802684abe4b93444a427ac18dca023441334e6923d576fc95c88a5469d8061a0578fd648695c76752950c43dbdb817c38e6c97bf726fa1687c0a0828f69c104e07492e03de0dfeec20cd746a10cbaac2ef9c44dfe4e9f919a9505861f6382abcbed6f1f8273b025aa2d85a0f486e04beca08b510ec6bc40370e7c48d6eb9ad00bf20a0ed94e5a6c69efca77e60b2ab32910b424ef2c3318477d8045dfaf7d08495047b0634b407dd41789d29de7f3ce326915ac22b60", 0xc0}, {&(0x7f00000002c0)="2500c9a13c2a4b800570aecae7a5e13b8a90df0074c678bae43b4010b6851855f98611f8b8c759f43681ae191c63cd2d03b7764b5884afb610da961bc1b99e7ecbd08cc6a20e95200e0e2be8d665e72824f157f22f1512d7e8266f25833f205b696fcd39756decc814524e3021f36179dbd98b2e38d4b3af5dfdde5c0a2ff6f1072d", 0x82}, {&(0x7f0000000380)="ce4de536d858f4839e24eb8e5b5b83377002d8bd1c118673e2a4211c478420841321dd0d100bb58be4d459bff0bd9c749da8fdd74205aa936f61363bbbfa6e4299cba90065d247ed379801953254674c4a6e9d2f75cb7c056e92ca3f34b56366cd09a84d4c06a9d4f41532bc0a32b23ff72ec8fa5b3ea79c0e25cc6af2553d8cfe", 0x81}, {&(0x7f0000000200)="0c626b45054c35d28266a55b42c04ea5b677c4afb5260ee9a1fe8cb4e246bd8f0bbf5bd1622044dd6033f6db1665dac207f2a0b8399727335b8c4058b7ca5bbdbc42", 0x42}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="d8f8cc9d444ff7de4947ee81fadb324c51248ef047e0f7a3562539dee49d838e24836009191d685d996913054520008bfba86d4d64c79373d1b218e1265e3ba743d8249e936580e9e5c60167f3ceb867379efa09d01d5e6fa933e45cc21fa1ab9d87a44b36691a02cfc494c11a5d5761958861cf1dfc49f8a3db8d2f224ef9bbe187fef2a9d0858f8e7a2b1cc25e2e92477cd93e2560373ecb7db0b4cf55aa9ef4846ae2e628d8943ea7034b0a312ade49e6d352f8451e2bb51e69e331abdcb2f5268740b88feee73f0b13192f2d3249bb0050ed9aebc03affe2e3542a7e", 0xde}, {&(0x7f0000001540)="7ccf715ccad3a03215f571c60fcbd57c9057086e6b9c47e2dfbfed29182cf1d9f84bd84496fe14373076df519e37eeb1cf8cbdc076a163007b98571a3e59b00425c07fff4b32cdfba508c1e1ec743ec5fab09b41bad25c1169f394eb9067dad2e80f8c88ab2daf6f832ba46a7cc160958d2240ab4dd8999340a55c6eb4afd54406fd4718a392e6a0d8f6a5189bfefe6f7408aa889f91c931a50c2cc4845c68eddea4da46afa2", 0xa6}, {&(0x7f0000001600)="0a6542702387543aabc2b6ad5fdecf67b8e7f104b6278b31cf6564e3cf613528e9ab4a13afa97ff072692d65b221b00c87a14185054d6f23100afb3589ec810881c5eaaf1bff59bf1daa2e69fc1004726819c60b125aef1e061af9671cea2e30b6915f1a71e519f1d40d5c3c427f2f79f655829b2b3bc4ab7aff0a38399d94ffc57ae8e749aca47daecbce4c170e5a30dd7a357fd6be6b4cbac842fa4b69caf9b8f4b01e6bf72d0605b63d799d0c9720f1fd67b6b73648fed55bfd17abcac37200d856aa0b84cc0b34aa981147a49068", 0xd0}, {&(0x7f0000001700)="185b9959622b6690a32c21e182c19f37a00001f9d3f745281046e90cdab6da429b292281d07e22c8f1fc2b3345ab524dc41057105b2b09a2", 0x38}], 0x9}}, {{&(0x7f0000001800)={0xa, 0x4e22, 0x1dda, @mcast2, 0x2}, 0x1c, &(0x7f0000002b40)=[{&(0x7f0000001840)="863b9f82c35378941985abcaecbf4c31243ca8d3476781e544cea1fe99e79ad5d0f32d07442d2dc70e38a413e46bfd8658b2c77ab4f98a8b2f8f2b78f49e5ad7c85c2b7b31a6e768dfe486e709b8666984d4ba3634d1802633c40087ad7a752298fd73452964eebcfde2f725c4993fd32cbd665bbd34571a6d4a0da867c891bebc3a54b402344b4bae4ee373b5ed1274fd786281111ad0228d91b70c338c33c69f0643c7995f8daa826029f0829ce57c17e4784096257fd50747e63c70070c68e620ebdc31", 0xc5}, {&(0x7f0000001940)="79d9dbde91510527ba52f7905add428f159c97c7b7daef1d316cc0dc9b4d0e9427da97e3b59fe34020e8b4b5cf8892f807311cad85dfadf582b9848c00d02b854a2c3d60667fb0f5c2ce544215aaf3508abf9d47c8ea2fc139cec54865119927f27192255b01d5787aab39dca96ea2fdd1747b14376bbf37311a6974d992c9f1431780302f1b2a8ba62ec10f4a92db10518a2f9996b33856dbee0120", 0x9c}, {&(0x7f0000001a00)="8dadd506868cfae99832a2f8a8ce15e5f73ec2cda641c4f2fff0d6ecd057cd38c983871018bbc2b8afc4d734bcd0ec637b023fadfde59b0703480bd49ec3904a4918e21453386f51df419f117c0037f38d6ffd49113a2f41622ae2b2c558a580b0b2827c65122e725923af62e6289ad025556e8afa49887f0b2c7190712d67756281", 0x82}, {&(0x7f0000001ac0)="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", 0x1000}, {&(0x7f0000002ac0)="2751ad66a6c7d285d5bf53bb5a67936976133754214c90219589fbd8b01c601f84fec5f764947f02754901d1b8d478547db38645c57c6643f8714a4ecf9f9658ea8375d2b26a40ab", 0x48}], 0x5}}, {{&(0x7f0000002bc0)={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3f}, 0x1c, &(0x7f0000003d00)=[{&(0x7f0000002c00)="95fac6afd34bf7f9c31dec9bc1f4d3718a345103ec8dbaf68b2d476a6a54a6a36f4d09296230cd5d3d1c0a1efad1f9734de3d9e598ea67f2310cfc90975e068cd62f7f051497850d8862017619b5ac2ef4fa0b1f706d961c54862d3dd069cbf4890e922f7a56cd5cd80d26cde6ac590603e37134e64f6c446c522dbe86881414d428bec7e4dc078c7b043b7e764e3f402d6d5d09a5e29eab9c31cf039cc0a7c391ce87901b87292d85ec212cd4a171cd0690374343c2adcc6c9f2c2e2a", 0xbd}, {&(0x7f0000002cc0)="51fcc92fdbd85dc199ffa15976c97546aabf1d61400f5e3790de74fd8cc9a9b1d340feeb99df60", 0x27}, {&(0x7f0000002d00)="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", 0x1000}], 0x3, &(0x7f0000003d40)=[@hopopts_2292={{0xd0, 0x29, 0x36, {0x11, 0x16, [], [@calipso={0x7, 0x38, {0x4, 0xc, 0x7f, 0x7, [0x42d, 0x2, 0xb04b, 0x3f, 0x3, 0x2]}}, @pad1, @hao={0xc9, 0x10, @mcast2}, @pad1, @calipso={0x7, 0x48, {0x677, 0x10, 0x4, 0xbeca, [0x497, 0x5916a625, 0x8, 0x10, 0x5, 0x7fff, 0x401, 0x6]}}, @hao={0xc9, 0x10, @rand_addr="10357b7843ecd31ebec4884a24fc2c7f"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x5de6}]}}}, @hopopts={{0x38, 0x29, 0x36, {0x91, 0x3, [], [@ra={0x5, 0x2, 0x9}, @pad1, @enc_lim={0x4, 0x1, 0x99}, @padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @hopopts={{0x228, 0x29, 0x36, {0xb7, 0x41, [], [@generic={0x1f, 0xa7, "cffd9f3e5f575d1f8ebbd5fb360742e4c07a9ea5ef5155f0c756921449d2f5e7bede9a7257fe21c3bbb676d448aebf41776e7d3cb7ce9d2757424c72080b1094d2fd689bf6782fad91757b1fd6c81e7d394e79aff7c1af63970a7697a03d481480ce78f056144bb22a80416cd8f12b7f17b1172c493bd1e2bcade9757c1752583cee3411aa86a636f58e77c41a52408b18754770420957dbf013c5a04ce36a4851bbd35c65d776"}, @ra={0x5, 0x2, 0x4}, @hao={0xc9, 0x10, @empty}, @generic={0x4, 0xbf, "b395f1f3fac05be932bc79eaf14dee904e1ee4d21d8d9162e608508bad46c01d77102040fdb9d9bb7dcaba184766b2666cf32a21c56ffa2e906d1d7b7edda22242175dd5ea0747e7db0009ef0b23ad27657d8fab882ae8aee9e4f5a80d8fb446d904a25beeacff95cf9cf7e1dea7bcbc903ab8bb69795a33c04886c2e4a6740f67a211ef64395f7991e6690dad4e606256df09cf933ff806e03507add4f8c9644f7b2591d8b9fbdc274c70f8b5449f00b2d45eee5a859399b80abde30a52a6"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @generic={0x24, 0x77, "926019ee9f080fa53db08686c01179f431aba4c7c473cbd686c5de49f4b04d1d76e540b6b522182f1af31aef9bbf5fcc6076b653cf49a1b1c863d9535d857af3d4e434610221c4c2888987b5a91e38ca2564920324f110c8bdf8af58703affedc2a4e19788b609a55c585c9ea7a82536f5176cf0c34331"}, @jumbo]}}}, @rthdrdstopts={{0xf0, 0x29, 0x37, {0x11, 0x1b, [], [@hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}, @jumbo, @enc_lim={0x4, 0x1, 0x7b}, @calipso={0x7, 0x40, {0x200, 0xe, 0xff, 0x0, [0x20, 0x9, 0x0, 0x9, 0x4, 0x6, 0x6]}}, @calipso={0x7, 0x20, {0x3, 0x6, 0x6, 0x4, [0x0, 0x7, 0x7fffffff]}}, @calipso={0x7, 0x50, {0x1ff, 0x12, 0x80, 0x8001, [0x9, 0x6, 0x4, 0x0, 0x9258, 0x7f0, 0x2000000, 0x4, 0x8]}}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8001}}, @dstopts={{0x28, 0x29, 0x37, {0xc0d505de4a9792ab, 0x1, [], [@pad1, @jumbo={0xc2, 0x4, 0x5}]}}}], 0x460}}, {{&(0x7f00000041c0)={0xa, 0x4e24, 0x7, @mcast1}, 0x1c, &(0x7f0000004380)=[{&(0x7f0000004200)="eb9640dadae1c3a3de30e351cc9b88", 0xf}, {&(0x7f0000004240)="2b1afd83c8ceb8ab42f61a7fd1aa4e565589c7a0ae5a7b058a0e6bcb2cd4d38daf30986b644182ea5ab9087b000a30dbf55c84285df3710882f0bcceaa6b059c3f77f963e01827990ca2648ce7fd272e9a3f074cd62bada03cdd3ae3e68a9202a2c2d6aad83edb7e7abea722db36fb72ed3b801aba82c9e8153f7802f25f77653c3c6cdca3583f36a07b282b253824a78da48fdab8c9a5b65962262fa936946b5dd719d00838cdfeca71b869e76dcdb8fc86791fcc", 0xb5}, {&(0x7f0000004300)="20b49c0e9140c52a731f91834c06592175d3bcdb7fc716f98e7ec6f1b2104db2ff4591faa8c71bb24c52246dc57dc86655c8a45d31aa994a2f9ab8fc95739eed4424489466f81f91d4f06061a2d51dd2618ff59460fc5d723cf0f84778781cd5212737d134f3c27d7148a3b73c6eb9486501c5bf9b757585551309ecc8e9", 0x7e}], 0x3, &(0x7f00000043c0)=[@dstopts={{0x58, 0x29, 0x37, {0x32, 0x7, [], [@jumbo={0xc2, 0x4, 0xe50}, @hao={0xc9, 0x10, @loopback}, @ra={0x5, 0x2, 0x7fff}, @enc_lim={0x4, 0x1, 0x4}, @generic={0x40, 0x6, "cc8bf39ba5f4"}, @enc_lim={0x4, 0x1, 0x93}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}}}], 0x58}}, {{&(0x7f0000004440)={0xa, 0x4e23, 0x7, @loopback, 0x40}, 0x1c, &(0x7f0000004600)=[{&(0x7f0000004480)="7898ccf956f6a4c4231c42e5549bf9a83110c0a340f2531c84481d8efc3cde29b19993dd2da9106862d5ef187a5213215c16370bdd90043c91a6174ffdcc9453ad6bce41b6f3f28d709c569a11795525b9cd3faeb8c1adf248f4360b2599cabf0ad5d39b561cd42ab81d9e22c6b047a63168fd4673c533f03374acb9c6527337422235b9e5ca818c40c1e82b", 0x8c}, {&(0x7f0000004540)="fe11e23210dfe6d861b447710f9260ad7bead4503d75501d6f29112aa694ac2bee2849f6fbf03e9b80a56406dd7969b70fcd3e60a8deb1ac0f8dfa820b518e52a7e857baf0218dc55a0a752f55a664f45c5653934aff6f84dbf3022076fe79b66bff9120f9eccef04a8edddbcec789d2c5cb49817e7b0b7e97191194b17df09f4b0472fcac127e8fb16687a82ae37b", 0x8f}], 0x2, &(0x7f0000004d80)=[@dontfrag={{0x14, 0x29, 0x3e, 0x7fff}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r1}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x4, 0x6, 0xad0a670c2d08611, 0x5, 0x0, [@empty, @mcast1, @loopback]}}}], 0xa0}}, {{&(0x7f0000004e40)={0xa, 0x4e23, 0x5, @mcast1, 0x9}, 0x1c, &(0x7f0000006080)=[{&(0x7f0000004e80)="7dd7d3e5202c98d7a7454219d7ad13face0f4215bb3eb77337cd6e5c512e", 0x1e}, {&(0x7f0000004ec0)}, {&(0x7f0000004f00)="6f8f2bdfa5edf96cd698fb8b002e9f027dfb830d9e838fe308ae008e97e19f32683d63e7824147644969e266a5fa0bd0b8b8b7eadcb8c1bbec73fe0b7e097de9e2a844af897c4759ef967c3644af8354faa748ac7e9cd1874df9bef9822cc4d1c72a92ea61e983bec8ea48568783dd51151fd329e443e8d22dd45d3735803290720bdefcebf4c751c11fe388597d65ca67a3d0cedf821b940cbb02a9695c129f683dba4dae4b7e1c18cdde52f289ece8eacb7afc5073fd201d20e3b6c22901d385e48c7d748a8901d7a3b5c45a65b6665ae6d4d5fabc1f810b8edf2a5125155d75b1cc5c94b797aee1480d53ebbc868ca7ce1fe0ccdd5068b3a26c1dcfa2aa99328f696f90d5f0350c98d528c38627b851a2805f5352a7c0bf49d03eae35e885cdfe87c4cf87ae608498ad1170caf17e18419e172ff351d9c5f6e4cc3bf6378120d628e1fb065f56681762265475046d277e29ea14905ac1c3a7a54a74a4576105a7b6d5a701a823169fa0a6513d1ce55e8c849d60913f2922bd469fa91bcdddc09afac62b04bae74be3405dc8567a1f5e63556cd9c7c28fda93e4afd2dafbe1d6e53ae9e074339885ac07071c6609241df7ee20d557766198e261c58a4f1fbbd67e5b74ba7c7717af5ca1cf3d06951ddbac6fb4866d55d8769ca412a18b57440dd30050dfa3c6cef63d5f70439a98ae53a044d5f55b336be4032ad69d93b4fdea1fd5744ff0be9323b7ca0342757e7ebd4c2e04e0185b81c974dd03d34c50095195f6252ed691a04c3c30281354b7a7c3b9f6e7c16cefa1481eb62ae944af12aab119455c710c2987d8f1b2dc7e0bf3bfd84960ae6a62b0845f73eb079a0173fd535ecfd80efd3059bf33a67814a6d45d89b5555836e4b0d1172e3887f0708523c27406dfa8f688920424ec99b5ec85967884d67fedc0a65b49eebf67463f5cc8a313dfe92121b22557c9295e552ff6881e92b986b2fc819143a58a33e037d04fafe2500a58153f4be038e94868a035dbaaa73fb8a34ea4eb0c94d75070960828b9a95ba84ebe16f75a25fd900655bee7dda2e0d2fb37d38af8e7c9cc563900ec0dedf22173774b38c3551c608a7b9fc8641c26e74d11dbb3076e8c2d444803634acaa28f691933257e3837688ab2abf0256bf0e14e579c2f2c66824e28b12d5990158a9e591bd1e95672a2e76fd057e1ca91e523addabfccf3f6c05587173d832947da369f9f6e49598836722f5353167db2b1227fcebc7a2afee1db609974d3e44d84dc079769487f289f03796e88c6c1d9a3fa3181bc7f77d15fe2d1360d5bbe5980dddf4428bebd7043356cb467dbf28d286f43e2e45acba13ecdb6b7349d3ff439ba2ed5132032eaf7c74fc6965dd34d43e24a8238fc927fe205164661cfd671d344728b99872c6a5d2dcb90f46c7e2682236bdd99a9dc0af7d78be82ca422c782550693bd7f91ff032fd67b56f7da2ec24a97d5102e9a89e06b7f46521d24d8d7a25f64c03855d7ab92c36123b0d3fe5110e54290cfc991dac2bfcfbf7ef0764b94a71d4ed98e9ca91ce6d705cd9e650ae6d2c400d4142c10359b6dba76b73fe1d6e140fd7796f73935d305d48ab12e28f2912169e2275c5b82c338a4e80da2e188b3201af8aa52113693085d2dc9cc0ff1cca9e087ffaa12e4b38c193adf073515065a0995702aaeddeec4f6e5a51e08ea4090c88731a977dd36e0b1ba39c165366d743ca48d711a53748b14be52954d709fdea72a4f6b72e737d5e958d1da2debd8d2153d217f1997f29cdcd953adf0c10418e6e376ebd1a36d275898805e0fa3441e03f17305684d0782704b36db4e3551872501251c33e467a6ca06da2b391b5fd621f06684d1490cb521fcc564907af00350cdcc2d271c29cc8add592ea79fcefb3aebf5c621e1187eb79d21d14946cc7ba847c15769ff55e6c313bb90867e5e1efcc32a308c9ab13a361f93dd272ee8bcf404e523247d7dd6691f5454be920cc546e81b5ec5e6346e29c954fe842fe0504f465e2ca039e8c162ed43546b680c9d9336f9a29282b40a6ee3ccc52ae3efc626fc8b317f35f52b471f2d8054a88aaeda220f681ba6308af62f6cebe4e50529ee66a26e4d7aede85ff90cd671540708272653ef6eec56c09bab3274d45e6d94528d0f8062eacefff89b33d38ad0052dd6a453ba203d57d4024a26a8ce53852978ce92b1d31f053c1fb03f70967c0a64a857eb1ce383abfe039d531d0d839d98d3b470488ae8906d84f86d98a803068a8b7c382a5bf2ac1d380804db52137c68a517f5ed9eadc94422d965a3264fd989fa3a46c4873f7aabde9e427ddb1e536e4c964c0a9c0ce103575af76a7f8693a8f449db91b6e8dea1873c1ea664a3d49c951079f62184b5f4ed193f9f922c4d2f2adee308488711ed8f00534d3a3e2c0c71a76309d82def6f812523ad9c0b23ec3dbdf4c466533bcab6f94e5573e6c9f391017f6beadedfd47303d24e7397051f2199b9b3a4e1834a1629c61bc83dfde78f26d165d3217870fb7bb26889dbb97629c3b8bd5e50aec5e59dba3bbecb60ceb4084dca97571d098f3c0c8cde3bc7c2cd0540ad0548ab1afa71458ce0355bb18ef7c35e041b589457d5788008e556b3d6f4338ae07c846d47d8a55e5aac1bec6d016809cdc81a04b6b967137f96317f59191c5e3aa62f3a9058b5b3d877d7ff8a20567aa8efe644b1b8c97b983bf5745fb31b1e54a8c103001cbe88e57089e376c17703addfb4687ee06bc545339f0f888ad79bd73a026d910eea88e55ea7f576eb364c079e6dd4014a91d9cc985d29cf9bd7efa48968258e14024adc84c817f123e11941e429a4e90b4d0ce77fab10dcad6044521f4d089ec702567d54e8556680c65aed8da3e538597d3283d4db901e89c963e7872ce654c741dc4b79a1e073b5f437f2547cf6e5121e0fe4487a3af0c4706971c8e21438fc27f071e364b6296f748e28f2310a140648b7e1e73d82d8e1e6314a5bdcf340894a4cdf767aa840e5759574ae7b7c087aac302f5fd9f291c0bb8947259d1d4fdc61356705bfaa4eeccbf07d3fe24feacfc84c2fe3dc7f57763c39fd53edeae205d6d6fe36d3c828cffba506e41546fb6eb5678bebfa1460aeebd2f659fded7182bcbdd8c29b44267d777548a07f2447f6b210d8bfe8a22fbdafbd8b82494c7243c86cf81f06a9c01ca674fc858dc080867f82d06f2dbc61cdb498012085b0e007b1b2afbc1c412156a482c808133a22de679482cb83123349880ee1fe7a32e68ba6b770b0e04c378193a191d7f7ad0c7774dde86f66de9e677a5b8a2e1e32f0336892f6ad3c0b3b6f305b48509d55180a4a9a887703864fe2231970ab3d4733da2210f5decfcda9a947ba53c3cbd76ff2f1d32798eca46cf8a3d4e52373611ac3b66afb8f2e8efbde8b53e1642e2c595b6840712fc78cb08f99d039285addc1305ca8818a946a771ad4415555e844bf5b86dfbc54e9a9bd5c5adb218b515c1fa0cd1013a7d86716c9b8b99b115eb3a6d9963c530a42f55e43dbb21b78db0f7dfda98b88afbf72c2853758ad72c7fb043bbe61a7ed94655cdb3afa1cbe888ddd3f0e64f25a53a37ed9d06177b58904914bcdf6e64ecba4cbf8f17bbccb75a5490d664df32ac0fafd699690ad4fd37b7d77657350cdd9b0e70f71382af9fd86c20ec15062b08657017f80bb3fb4d2073e3d3f4f12a2be19b99cb3827a95593c1c1a61c8ef70cc6a06153d11a6139175a0b10da5e5d06fee56720d2e417faa1f9eb0cf3d4dc9795f59603096286219597339d39ab375ca1e536b48fc1cc3796728804bd924d6e5f0fc251ec1c26a336ee409e83d90bf0d6c4c5e4c1e9c314928cd09a8665536fd2a8f32f2ce8a9d085ad7cbd0fc70ed996928d253ffde382eae90070ffe4113b591e1293359f1fec7c5de4549d96e642e16e8ffbf34ab9a5caa01db12bd977bb5bd35588041df320584fb92a6994fed6fb45269abc6bb75a3fa874d08a5b98193f122436d391c3bf0bc9cfb1e3e0ddbccefb7ad272213f69b45bf46e35d93567799cc8e846ebdb8b97d0c419191c08f6de824b61781dcc565b20feff0ef0c2ee3e06f5e1e7c8b8ed07c1a84aee393738200b48f241e0f2146770047697e55c61da770ea149e05392db696138eb8acb3a717c6d4bcbbc44694098cdccbc948f081068e83c6904dba189172731bd351285c35d31f3e8e6d00b16649061ade1b608cb71693189fe26809b81bbfddd0ff41db69233207d8f1fefe221d8d36cc8b9e7c9448b32634640d648809f848802d09a065207bf96c824cdb88f63aeeca6402cfa531bc41158a94de1b0588bace128125731a8f34a1cc308f2424c8a3ba402855857d0b2246d81a2949d31e895cb0fb77f234fdf589b2f74b6eb94586a7eecc4d8f75ee05d494daf2a0807ea78b4a27bcd4740688a02c464597bd1aa584ec1333ecc1f4178f3765caf6fedce6d63ed7d3aed860d9da480034198981d1a20d536d7f6a4a1fd16de29dc4ee65bab94b2e7605b7e1223f9803bff0c55763f068330aa9974790fc6f964ed247cc2cdd6b07093ba241064126a6f635abd33b0b441d92634a1030e5a2fe75521856ab00af8b4ee22a23c25a1f8c87a769ebfc2a9978a135ca53c92f3a0b57725cf127ea4156bccf0090b042f8de748d0955d26c5612fa9c8a3f3dbcd7b5babf92df787f89716f1c047ddbdd46d3bdac25aeee0f050facb4a60c5dbe3ed48b66eff5c513a8da917d58d00a017e06c8b951e31ccb6f658c591b6857e78779bd2ab3031ef50b1ce3368e3523b16ff085f47b923b3e0600e5f12cf44767d331cb412a63b4f5715bc885556dbbd305da60514406829f58d2c9f5f2469af61639bdd015a8c0de7dda43252d926d32c809285c0ad2c34d10c3c743933b4fe0f75280cb3156e92480d61c2e5fafc86cc1d4485ec238bb380c4fe77899c0be91d0f72211b95ab7ce7ec61d47f26f2f4006e975759981d401c6cc32bfcc3ec2c8934c421ebaf8a3a9dd41906709860f8d76ce15e34e27ba70dac25c4b53c621fdfd106fe60025292394b347cdbcc9cdaabd881c03c5adbd93df152985af1c1cbe464f8bd86c027eed51e079cfe7ade44fbc3df7a9f426c150b1246fda317e056f0ee38fd1b2996349d40fcaadd415d5d9336202b465a2cd82f7dbc214f3cf4aad454e0c8b7c35614dc02c74ff80609614986355ef0acd1ef51dc6e1459078b493ed2e24346fcd63339bd0c4fef3e7cf4cee61a777169c4faeabcb69b9133266010dbba9a9dab15e0e75cc973c491cdc7c273de93de6d7dad538b3c2de23773f00d18ccb473ba90efa10e0febfd9739b07920411ac928bfcc522ec46889211419d23a4ad64db543a20303dd1e9a0ee7d5bcb533c07761ee90cdce7ea28ae99837e23c5a15cb07a052677e4fdfe8c5a0848a4f4461bba3b306d41271792deedae70a932da345971ad6c1e2ef854a972763b4acdf7f5c4692c1766f2154423b0dd1e5a14af539a1b1003a66ef46f6be1c1fd4d827198278506ba5bceac55ec12d2ac8fed229493dd2157f467f7c691cfad908102fa31396b44665d6ce01a0cde1fd4e823c945e5cfe0c6cfaf4439169b79329ab5e876178b99d3982729df664ace57c6ac8b5b7a34915bca8e01f7ee37e3d6f192af243c16f0650f5bbdc4309184afaef27e13a19acd4c310039184bdf4b44db31dd0f4dbd4967ccd9d5f0057369b14050d42654526a7a9f6611731aff440aa64b01b7369ea14ae3f8806524f0ce75ae4c1e6e5e", 0x1000}, {&(0x7f0000005f00)="e2f8164ad7770645536c2464956bb311765e5c97bf4becd83fc7050075710aaf345f6f0a020d2db5591ea874b62d73733951edc5926c3a0a888decb1ee67120a58f75a1fcb323e54ed6ff8fe7a558ceac603b948368ddfbe0ebd6971be51a89a6ea39c681ebabc8f34", 0x69}, {&(0x7f0000005f80)="415070016d1eeda7e2ad8df3e00ddb6733b7589646d73cc8c7f02edc12e0ccbe6ba72092eb3e8975b81b0b87162a879a107ad56ee363d5fef53b2401bac860f0fd48b789368ca2f4c738e52824fd1d2c5a9d64b191835b3e25c6a61c1203e289e0bf8fea121245c990ff733873ff654dddb1f1e43790d7c9d7d5bf5812e7c7eac2a3001545091f25a6810051c650f4dc6994ac17177b34ca81006df5b2978a054639357b1ca5d63ac21678d7d11fb35f0da365c3f1741d350a5a527fdc5173978c72362d9c7ae7011c43aa515a068283c8f14da3b10b3a8eb410c8065dc49462d0d774eff1431f", 0xe7}], 0x5, &(0x7f0000006100)=[@hopopts={{0x70, 0x29, 0x36, {0x0, 0xa, [], [@generic={0x2, 0x46, "a33ed583b254d823adefbeeac286357a55cd2a65c10fe14a59efbd8f2f6672961959e9d7c1d7029fd060cebf885c1b5f78a50f88f0c13366da7baac700dfaef4577918590a87"}, @ra={0x5, 0x2, 0x7ff}, @enc_lim={0x4, 0x1, 0xbc}, @enc_lim]}}}], 0x70}}, {{&(0x7f0000006180)={0xa, 0x4e20, 0x1ff, @mcast2, 0x8}, 0x1c, &(0x7f0000008680)=[{&(0x7f00000061c0)="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", 0x1000}, {&(0x7f00000071c0)="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", 0x1000}, {&(0x7f00000081c0)="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", 0xfd}, {&(0x7f00000082c0)="f16acdb6ee442a013438380fcf8df629537d0397ed20a34b15df48a124864bae140082039c1645ff05ae8f4547e1b9e962bfd624d731569c180334d73051d62973b7a4ad5c97ded2a73145ce0377423a182cbc2d23c6c5208bd5dc34e31a88c1e70e3629f95a8ce83510126f3383b1b367405e1db683cd1a67d4d215074ccf705b13a88528bb9121c482ba921d78b7661a43ff51cd7e3231262bcc26671b6e3418da9ea53cad7fe983fb28f2de96ae498c33f770ee373b30dab64345", 0xbc}, {&(0x7f0000008380)="d7072d95e6029a8228db29e7df0641bbb54f983dca223a20084a89f644aae0550b874945999a8ba4393b80a99e2202a3f31381b055a9d22b300977790ad3934786829e69a5b313e0b4c9fcf105564ab8ad8db758b8d7764b0435d839a4cbf81e058f9a09fb9a1402cc9abe90a3b3a7", 0x6f}, {&(0x7f0000008400)="a36360dbbd90225c1137c33ac5d2ca8867020c1393c95e2ec999a9eba5ad02746ab638f8003d4111d52ff2b16b74f9dbd5bdc3de6bd8b8336e6d39c02089dceba57fd5157f31d3dc79", 0x49}, {&(0x7f0000008480)="54792500129312affe7c782063f1927a9be33d623d628e17be045aa39ce879c5f8784cc4992097248987ca38e922accf99b6b1dc355cc9e81289ab2f56e1fb6fb0162534866acc00be6fc437a11cfdf8acd4f53db659f4c4819b020a667192e625285eccfa9e487762f2e94a2fc38e7b6319d73ea15cb6e243b6c894e0ae9f72532fa2c5bbef2dbb2d880342d31a5dbb3264245892869867c151f9cacaebc8", 0x9f}, {&(0x7f0000008540)="47165b68e2e014531e3ab50de9fe82445cd44aa3600ab09be22a58008d855bfc51abd14c44e4dac8b0d7f41a353dc04e1d00b8e2c6936c087fe82c43b10bd6629f6c4220a47d2302727a4ae5fe7fa795c777df6dabe381b7ed987b", 0x5b}, {&(0x7f00000085c0)="0ccf9ddd6ea91cec5b7f36816cbe61de583ddbe4d6366a43059a957c543a22e451c456f406eabe26f590ac8be96aebf00832907880c6435de9aa129f141d05c6585b9dc0135e552474fbbebc42c5147e20647d6692a42050cdd9d7980ab72449c81d3008e63b81af55a26085c4f88e0b9e8c43a1cc4c6cc7aa93181517562ba9ea9832b1dd469863612d39c4bdd38d36209cbbd5bc2bdd65f75d62ba85189c3c2b0a6c52ee788832e9e92d23b2aaf209d807aadf54258b1c001d9ea730fab8c9", 0xc0}], 0x9}}], 0x7, 0x2) 10:08:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x89, 0x0, 0x0, 0x200000, &(0x7f0000000040)={[{@abort='abort'}, {@bsdgroups='bsdgroups'}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@data_journal='durn\x06l\n\x00'}, {@journal_checksum='journal_checksum'}, {@lazytime='\x00\x01\x10\x00\xe2\xef\x1f\x8d'}]}) 10:08:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}]}) 10:08:39 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffd58) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:08:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) fadvise64(r0, 0x7, 0x9943, 0x7) 10:08:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xc4) pread64(r0, &(0x7f0000000540)=""/4096, 0x1000, 0xff) 10:08:39 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x200, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000003c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="2c44bbfdd6b5e7bd5cde5acdae388c80c0d5243fbc634b9405caa2c5cc8ce94e4cb95d334b93532f06b108690eeb2c1969a6040e5d80931f01ed15fef18c4e0fbac81093ba43b2bff469b5ae66489106265614b6188fc696d9aec9eef8cab69b5a5bf68d401912a39b368eb1b7c3184afd76f4053549185b83eefcf489ef6c1f80ecae7f24440789fb0a6bb185", 0x8d, 0x8001}], 0x8, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)=ANY=[@ANYBLOB="294576657273696f6e2c736563ef50d872b90e325ab87300000000000000010000cd10e8f121a961fc4859439b879de74fb7f261c26c5f6526e886fccb1d8b1ff268c562ae3407ffeba43c325fa1d7e90a4e94eca9a7aa19ce2394748aa16a536b7d980ac20aef51741e9055f8f92434f56640c099b75cc0225f4d0beca8dd45dc8cb50200485c696d40b486cdd20870d982e890b8d4472fedb35894cddeeee222e71bc09d6797915ae542bd7bbc9490fc057e79a7f42cdfc54c095270"]) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') 10:08:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000000000), 0x300000) 10:08:39 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x16, @empty, 0x4e22, 0x1, 'lblcr\x00', 0x9, 0x5, 0x48}, {@multicast1, 0x4e24, 0x2000, 0x3, 0x3, 0x80000001}}, 0x44) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ocfs2_control\x00', 0x10040, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8, 0x2, &(0x7f00000003c0)=0xa84f}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r5, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) fcntl$setpipe(r6, 0x407, 0xffff) r7 = accept4$tipc(r0, &(0x7f0000000480), &(0x7f00000000c0)=0xfffffffffffffd95, 0x80800) ioctl$sock_SIOCGSKNS(r7, 0x894c, &(0x7f0000000140)=0x44) r8 = getpid() rt_tgsigqueueinfo(r8, r8, 0x4080000000000016, &(0x7f00000004c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_FIOSETOWN(r9, 0x8901, &(0x7f0000000180)=r8) ptrace(0x4206, r8) ptrace(0x4207, r8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r10, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000240), r11, 0x3}}, 0x18) 10:08:39 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) pipe(0x0) close(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet(0x2, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000054490000000000000001d4d64300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e816e4a12d356b0f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@dev, @local, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$int_out(0xffffffffffffffff, 0x5463, &(0x7f0000000100)) [ 249.345065] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 10:08:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x17f, 0x0, 0x200000, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:39 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:39 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200040, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080), 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) pwritev(r1, &(0x7f0000000700)=[{&(0x7f0000000100)="c152da5938b5ca15a57c9f443079d9b5ee8db1fa0a5296166d31339462984a0b81c857547705454d0763dcc927679e7e1e1148a30bc1c58fe1f79ef9f46225", 0x3f}, {&(0x7f00000002c0)="2884e8bfe4e50bd19d0f8b06f29094689cb5826b598c19474aa824c71fc78d2917835f621629bed6b0e5d618a70036e8178547c404d297e4fff773c89c591fba3469c660899d06b742beba64a6058362944f2cd8b331f27e8fe8b96e5499562a04a0a4f1a4306028f3942d440a6a9332bba1d5222cb9fceb6ce1c6f83e90734a47b94d95bf63eda4328972bc6b0c054103181e150856dd2695b018acd231bcf94872ec273e969c37d45be47d5eef833bc79aacecadf5067b0fd7c6bd4172412d", 0xc0}, {&(0x7f0000000380)="40ae36d00f460024308a6333754b984f40af9c3399bf5ad60d056361d8fc079773d28b1cfa5b09c870f7608b7c5edf082d523d798b042ee0470681ee926aab64c27fd6f867401e05f03030af876eed828a4448bbb1c1670ef2c4d62b0b9a71eb86c3c64fa9086cbdf88b84d422cbe11ddad25ea2e24df46a80ead2a69ff8e12bbcdcf265fdf0354951df818bb3199b3970662c3372ca49f47f960f8893b8e73900bbc3dbd82034fffc2b2ce73b51b702e1c31ede9e36e27c4dca2b1dfc000162cc2e55b877fbee8e7f355501cff2d210", 0xd0}, {&(0x7f0000000480)="b2199ffb27d06dfe1c1e52785d3c93e04b99851451717c9c7288b698f53ae8f90d22c4e01bfbc3201ee0fb470f40ab8b57cb9bff8f9c77cbfb1beab5536081e80579e0c5f2799ae281285c4bea40c645526026e35971508607c23cab540a0b367a3b7b97cc73c0ce8d53c168d9f19bb8c2ac8f8cdf9ad3b0171865180d1a562f1891b6494b662ff2828ae0a7a34da0e9c55af6f1e0e8a7b264dc06a5c3829c31f7833d6a0407040c4d2c7743e66328d9c27fab755c09ff09e4ef4303a3f04bbdea03f7e4986e559742b338025b1e5571", 0xd0}, {&(0x7f0000000580)="554fe7102a7724483a53938cd50b258144fb1fc3b855febeb019190b82f48f840dfb234e0114348248c6679ec539b86e6eb62ad9550f3639b8329af4d588f5d85a60cdd5f161b16d7f50106d865fdb823e83a50bd3c677295a899a6a482200b7f22426655652d981d06a3bfaa876c4ac61f7cd2dea1643d5374a13c46f8d370353", 0x81}, {&(0x7f0000000640)="9f2385417b60f296a36ce8113f8f2ba30d80503528d392a0a76d4f965f142b62440954ee6e5587e7a234d2835649210d14dd6d8e3659bb51273e5f92da79d5ca6367ce2230e752e9d48384b5ccffe64b098b61e49e18960db82c528c06dbfc678f88ac0b7f7039a0a164c6ad8bbd638bed9c4f9aa7c522c744252a22fdd5c89f051fb1a1ba", 0x85}, {&(0x7f0000000200)="1023bf38904814bd3b36129634c11659dc7f13923e3d86a398da20e0dc8beb77ad644284ef8de6f6f4a10c15ad04a25904c329edb8bf95ac640929d1722899c72747533ecddaf6dd5d851998a77f0cd3495e800f813aaed1f20e182e2c3c4cb949e758e3333fee", 0x67}], 0x7, 0x80000000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000180)=ANY=[@ANYBLOB="695f76657273696f6e2c7365636c6162656c2c006cbd92fc35d39bdc70f15fcee6df264efe545e69d6f8931c2694d9b5310815eee79490b73cc3a3464d9a6498ba5701f37413eedce4405fa86aec"]) 10:08:39 executing program 0: capset(&(0x7f0000000640)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xe}}) 10:08:39 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = getuid() ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={0x3, @bcast, r0}) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="732d572cb5a17b3ebe8783ea50dcc26370f54e74cb0575c7915435175389004ede265034474340e974d5"]) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x290000, 0x0) [ 249.724571] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 10:08:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 10:08:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x10002, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200)={0x2}, 0x1) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000180)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@uid_eq={'uid', 0x3d, r1}}]}) 10:08:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x600800, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) recvfrom$packet(r0, &(0x7f0000000080)=""/27, 0x1b, 0x40000002, &(0x7f0000000100)={0x11, 0x1b, r3, 0x1, 0x0, 0x6, @remote}, 0x14) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:40 executing program 0: 10:08:40 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) rt_tgsigqueueinfo(0xffffffffffffffff, r0, 0x12, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:08:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000a00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0xfffffffffffffead, 0x0, 0xfffffd79, 0x0, 0x23d}, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:08:40 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) sync_file_range(r0, 0x7fff, 0x4, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0xfffffffffffffece, 0x0, 0x19001a, &(0x7f0000000040)=ANY=[@ANYBLOB="7365636c6162656c2c00d0f635ce604d831fed88f656924959032dfe82e8041a59140b7497cf504dd1a8b1bd701a076b4bc307fd996dc8209f74abd31e4fc317ee638fb99e06416ce002521d1a7a2c322461f494848d9d5746631fc64db76c68992b5c74d11dbccbbb6858b461f23200"/121]) [ 250.178816] bridge0: port 3(gretap0) entered disabled state [ 250.190392] device gretap0 left promiscuous mode 10:08:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) socket$packet(0x11, 0x3, 0x300) [ 250.238394] bridge0: port 3(gretap0) entered disabled state [ 250.252163] ptrace attach of "/root/syz-executor.3"[11632] was attempted by "/root/syz-executor.3"[11636] [ 250.490539] device bridge_slave_1 left promiscuous mode [ 250.496176] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.578444] device bridge_slave_0 left promiscuous mode [ 250.588356] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.766745] device hsr_slave_1 left promiscuous mode [ 250.807151] device hsr_slave_0 left promiscuous mode [ 250.847141] team0 (unregistering): Port device team_slave_1 removed [ 250.879501] team0 (unregistering): Port device team_slave_0 removed [ 250.917002] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 250.969266] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 251.179427] bond0 (unregistering): Released all slaves 10:08:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 253.081517] IPVS: ftp: loaded support on port[0] = 21 [ 253.929055] chnl_net:caif_netlink_parms(): no params data found [ 253.966649] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.973424] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.981036] device bridge_slave_0 entered promiscuous mode [ 253.988126] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.994951] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.002340] device bridge_slave_1 entered promiscuous mode [ 254.018880] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.028366] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 254.047400] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.054709] team0: Port device team_slave_0 added [ 254.060609] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.067698] team0: Port device team_slave_1 added [ 254.073282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 254.081645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 254.144057] device hsr_slave_0 entered promiscuous mode [ 254.180456] device hsr_slave_1 entered promiscuous mode [ 254.220998] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 254.228396] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 254.241958] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.248326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.255007] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.261479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.296509] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 254.302687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.311975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.321606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.328850] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.335875] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.346691] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 254.352928] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.362531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.370648] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.377016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.386694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.394873] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.401268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.417738] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.425421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.435061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.447180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.457362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.470328] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 254.476787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.492475] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 254.500271] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.507018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.517515] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.910683] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 255.789956] EXT4-fs: 20 callbacks suppressed [ 255.789965] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:45 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) getpeername$netlink(r0, &(0x7f0000000080), &(0x7f0000000100)=0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:45 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:45 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = creat(&(0x7f0000000180)='.\x00', 0x98) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = dup2(r1, r2) dup3(r0, r3, 0x80000) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x4080000000000016, &(0x7f00000004c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)="868c38357f5b7d67e6ae010000000048c05d0d31", 0x3528a9c0}], 0x145, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r6, 0x10, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0xfff, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x9005}, 0x10) ptrace(0x4206, r4) ptrace(0x4207, r4) 10:08:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) write$FUSE_LSEEK(r0, &(0x7f0000000500)={0x18, 0x0, 0x2, {0x3}}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0xfeda}]}]}, 0x20}}, 0x0) r2 = getpid() sendmmsg(0xffffffffffffffff, &(0x7f0000000480)=[{{&(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000001680)="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", 0x1000}], 0x1, &(0x7f0000000300)=[{0x78, 0x112, 0x3, "70f01981a49b26f65e84a13854c0a89f4211d954d14e9a4950ea8fddba28e86179aead5ef593ddab27df284da875ffbfd1c90d6b49031fca98bc17f42671912a44af80677cd42d3c82666f79e4908c559c9b43d22596f4a5d12ab81429cd9b21c0178638df46d8"}], 0x78}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)="3d54470a1d64890f38b868fa0519c4779cf16f7455a2ea4b46c76fa561d219e64adeb777aca52a85b2875d804596ff073beaa4ff6259690057ce8b93585b749728d6572bce964ee9eae489e461fe6a7d051487f785eb3315e1f8aa533832e115ef7507b4ef82eb52ff8eeae9a1e97d8e6c2b", 0x72}, {&(0x7f0000000400)="c6", 0x1}], 0x2, &(0x7f0000002680)=[{0x108, 0x84, 0xac, "214359edfaed3bb97f0dd6a67f82381aba6b1ebe5f3b77dd53682dc569f4633e22e2a72efd446e3a0b71860a67ad6a11bf92693ff359776be3ba157a72b9622c2d3bec747a90c38ab0e6fd9aea28bf6ce7201d70d7b3ed54e7094f9caffbdda85bcf1181d764ec45eae54954b06d573427acf3a96aef9b0b1033b890d7b153b721e4c45434da4d8e3884d53491f3f1f1f4d80102f9cbadb418a2d384fccf94cd35433153e05e81aa309185e78bf20158bf204c43de10140e33cade5dfb76f58f1a79deda84f1593f4f9627566546093e945fb8e8bbaf5410f0aa306d337d351e8557db31e2364c2dd62dd93d7ace65c37e9e"}, {0x90, 0x12b, 0x7, "55bae3f3e8ab764454bef0330adc73d472efd1486647f28e83df69a77a3ae14a26b6dedd0f122de4e077885a5d284c576dda23f8e86c032d0be423c8c0f74652e33e901c68e698b842b1d77ccadf15440956fa5e718eb2bc0427d98c941ca3da84f76dbb91d23784f07f05840420ebf629ff6a377735e98d7d3fa6f1"}, {0xd0, 0x0, 0x9, "d92ae9cb5ca1f2506000161677a2ff5cba75dce0fad4f362bdff5c3edc21cd9288c5a83e1365af407e1434b2185f9062c5f1241521113c288e452be5b640e8af3bcd225d987a7ebc8e7cc8fabfb7f573b91ab7c1d37c9e70636dc7a4987151b5b46ed5674722dda8d2d709d09ea2a188981e47bc77b8f5f27b0bed0450725d7511e03c422fbbd9512a14e55612b17e7b04d1b9ebe7c78a35aa0a225bdab5d24ba9f1f901e47e2e71c0cc7e3b98d688624a60c6f567fe621118cf"}, {0x60, 0x104, 0xffff, "bce6f90cc7f60769d4efc8412d08a49e28f5d236886344f44cad4832c9dace580fcc365e45a2b6cdf708af8bed1e456e78685f0ed9d12e677ce66ff4fe03490e9e5e043ec3f238efe76a26bce5fe"}, {0xd8, 0x102, 0xffff, "e66a5cd97be5fdb2cea41f7aafb4d4bae770cff8dbc3608ce9dae44633efc37ca8b0d76d69d27f945db6f21f8e213083ba4b00daee6f2cd174af608d4ef4914202f19e8cf564708f615746c9a6923cfe6acd11a9ec43f27176081b3a247f002333c9b0cda403abf64b3a2c3a482e83728445ab1b9f2a31cee1448ec43096a2d8ba5367e1424d0d93743f69db449564275c999c2a6e18fb63904524596d7b0dd490208e9f33e2ccc7d5966d2dc0cf7d2b0e48e07acea21677624fc7abeaef154a341c"}], 0x3a0}}], 0x2, 0x10000) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRES16, @ANYRESOCT, @ANYBLOB="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", @ANYBLOB="a834c8f520c561067375c5fb6dd0f29520853aefdb14416e6bd9a167d0a8cacc96589bc7b2e8f03ee91f01b1ff29ff03ebca1790f5d6fdab6ba51aee98308c2915ae3de032d0d2e8bf890e5867250914bbff71cd1d492cfc20497cc0620454c33d254934226ed88a5fd24a2315f4a5aeb849f5bcd1087b1b7ab2e9900c358cb06b1d8137c6a8cf690711fcc2bccd4dbc310e2b00d1303689237dc7177d2a36eaade2d9a3b24d6af060656cadae4272a7d20f5fd4c4d5eac66e2e65f6b65ee52c3a3b05063dc1511b790176313064d36acb5828a464e33a8305cd8a362a1b297a6116ffb4f62688bf", @ANYRES16, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRESOCT=0x0, @ANYPTR64]], @ANYRESDEC=r1, @ANYRESDEC=r2]) 10:08:45 executing program 0: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x4000, 0x0) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) 10:08:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="000200000000fedbdf25050000000800050026000000"], 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) getsockopt$inet_dccp_buf(r0, 0x21, 0xd, &(0x7f0000000040)=""/18, &(0x7f0000000080)=0x12) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 255.944183] EXT4-fs (sda1): re-mounted. Opts: [ 255.955586] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000600)={0x0, 'hwsim0\x00', {0x1}, 0x2}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) pipe(&(0x7f0000000440)={0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000480)="e6cf231f7076f96290318c0d6621efcc48e1720bbb34d2aeaf6d69dce6edf2542f5d1e4df1dca0346c92456f67311f2b1e9b18dd0878d6c6fea080f16b261c5f2187ff72445e28f008773d8caece8bde1a43a650f46a6d", 0x57}, {&(0x7f0000000500)="309170c47bfd9b9f085f43b6a3307cde4cc77df7d3342ab5458b4f9407f5009f9ff8f917fac814f18c88b013ad87b95280911118932d11405c7a88de321a32587a7a2302b4145f10d1d52aaaa869b8590e58d505544bb2f35abcbf3fb9e9e67ad4bf42cd3aaa4bffb05688b9e105a76995b078a3b4515c44", 0x78}], 0x2) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000180)=0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r4, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$int_in(r3, 0x5452, &(0x7f00000005c0)=0x5) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x800000, &(0x7f0000000040)=ANY=[@ANYBLOB='smackfsdCf=seclabel,\x00']) ioctl$TIOCEXCL(r0, 0x540c) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000680)=0x16b) open(&(0x7f0000000140)='./file0\x00', 0xf404a06d0b00cea7, 0x10) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x0}) setxattr$trusted_overlay_redirect(&(0x7f00000001c0)='\x00', &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x3) [ 256.037930] EXT4-fs (sda1): Unrecognized mount option "@" or missing value 10:08:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x282bc706c158f726, &(0x7f0000000600)=ANY=[@ANYBLOB="000020897e896f00000000000004009d1af6493fd05646c031bdd0c201d189d39301a97b8e0ebd29fadb554f1ba17ca52fc969f765998594d7dc59e34544114a643d6763886354bca475c42aab266f8ce17e414b845d7f784d4489c33ee6d1c2f2e7f23377047ee64f416d5a1227f304bfbfffbb9c887e0f0486c7999158dc014389f702e185e6ef29db2e978d17c904b32edd438680af98ad91c8ad052e234fffd3752f230efe0d8e3d83ffac7d690f909c4bafa6d29528b4d9d6d629169559dffff806"]) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000180)={0x1, 0x0, {0xfff, 0x1ff, 0x6009, 0x1, 0xd, 0xbbaa6169d62385ea, 0x2, 0x7}}) write(r0, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r4, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r5, 0x110, 0x5, &(0x7f0000000080)=[0x3, 0x4], 0x7ffffffffffffdc9) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r6) 10:08:46 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1}, {@in6=@rand_addr="02ed4d73062b85e8a45dfa2e6a347805", 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) [ 256.134284] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:46 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x88401, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x44000, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000100)=0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0xfffffffffffffefa, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='\x00\xc9\xaf\x00'}], [{@seclabel='seclabel'}]}) 10:08:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='cpu\t&\"6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x9d\x17\b\xa7\xb0\xb4G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c\xde\xb5\x87\xe94Rz\x13\x8c!\xf0AW\x9ef\xda\xbd\xc6\x9d\fY\xf9}\xd8\x92\x84\xc3\x18\xc4$\xff\xc6\xc9P+\xdb]\x91\x19\xdcu\xf2\xaac\x8a\x995\x02\xc6\xbc\xd1\x80\xee-\xb8\xce\xfc\xde6\xd2\bi`D>Y\xcfau\x86\x1b\xfe\x97\"\xcb\xcc4F\xd0\xd8\xc9\xc0\x82\xeb\b^\xe5\f\\\xca\x86\x7f\'\x90\x99\xad+\xeeD%\xa0+\x9b\x1d\x04\x1e/\xa0I\xea]b\xff\xf8\xd5n\xb8\x06l\xac+j\xd2\x8e\x89\xbc:\x12\xaeZ\xf8\xbfP\x93\xcd?\xa8@\t\xc6/\xfe\x8f,\xe5\x1e\xefm\t\x95\ts\xdf\xa7\x19\x84\x15!3`\x8b\xd2m\x12w\x95\x174\xa0Q\a\xdd\x9c\x83AI1B\xe2e9\xd6\xb8\x9bM\xd1,\x0f`e\xfc\xffR|\"\x1d\xf3\x90;\xc2') sendfile(r0, r0, 0x0, 0x8800000) [ 256.447158] audit: type=1800 audit(1576231726.342:65): pid=11765 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16888 res=0 [ 256.552232] audit: type=1800 audit(1576231726.452:66): pid=11765 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16888 res=0 10:08:46 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = openat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x8a000, 0x100) openat$cgroup_ro(r1, &(0x7f0000000480)='Cpuacct.@tE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0xd3) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(0xffffffffffffffff, 0xb, 0x0, 0xffffffff) r3 = creat(&(0x7f0000001c00)='./bus\x00', 0xb3) r4 = syz_open_procfs(0x0, 0x0) lseek(r4, 0x0, 0x3) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/118, 0x76}], 0x1, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(r6, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f00000002c0)=0x80, 0x0) r7 = dup(r5) creat(&(0x7f00000001c0)='./bus\x00', 0x9) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/k^m\x00', 0x200440, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r9, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x288, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x401) r10 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x800fe) sendfile(r7, r10, 0x0, 0x8000fffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/835, @ANYRES32=r11, @ANYBLOB="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"], 0x3, 0x1) 10:08:46 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r4, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xfffffffffffffd7b, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x20, 0x0, 0x25dfdbfe}, 0x876bdd53e214900f}, 0x1, 0x0, 0x0, 0x20000c5}, 0x4048045) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ftruncate(0xffffffffffffffff, 0x80000001) ptrace(0x4207, r0) 10:08:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) 10:08:46 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 256.915470] EXT4-fs (sda1): Unrecognized mount option "mask=MAY_APPEND" or missing value [ 257.024581] EXT4-fs (sda1): Unrecognized mount option "mask=MAY_APPEND" or missing value 10:08:47 executing program 0: 10:08:47 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0x7}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) 10:08:47 executing program 0: [ 257.182541] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x3, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:47 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32, @ANYBLOB="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"/2516], 0x8d0}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 10:08:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) utimes(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)={{}, {r0, r1/1000+30000}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) mount$9p_xen(&(0x7f0000000080)='syz\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x9d586a3da8f925dd, &(0x7f00000002c0)=ANY=[@ANYBLOB='tvans=xen,obj_useid<', @ANYRESDEC=r3, @ANYBLOB=',smackfsfloor=ppp1$ppp0)$self]eth1trusted,rootcontext=user_u,\x00']) r4 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000a4f000/0x1000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f0000000680)=""/213) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000400)=""/28) unshare(0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="7365636c6162656c2c0095b23268e373d913439492bab422fdf8d2ec610be43e9a1f5d90a09a13dcea470fb56ba4ff3694c2314683f42de15a4eb531b923c6ae87792cf78e26805871081bd2c0a7a790f0f9922f66a469e45f670f5c549d7d7114a99c13e2179d2bd1453fbec5731b46b12b4f52f5cc957158f8440e43fc6100975e1cadc8e064147bf602670c1b7322e039ad9fc1de69eb945d1d6b86ca9372df53cb"]) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) 10:08:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 10:08:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 257.337478] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value [ 257.397690] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:47 executing program 0: r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="01"], 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 10:08:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000180)={r2, &(0x7f00000002c0)=""/229}) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="757365722e246370755d65752970726f63e17070703100"]) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000000240)={0x40, 0x0, 0x31f1234dae9d5319, 0x3}) 10:08:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0xfffffffffffffcb7, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) [ 257.596649] ptrace attach of ""[11772] was attempted by "/root/syz-executor.3"[11846] 10:08:47 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:47 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='maps\x00') perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x4000, 0x100000000000000, 0x0, 0xa6b13f4a0c7860e7, 0x0, 0x401}, 0x0, 0x6, r1, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r2, &(0x7f0000001780)=[{&(0x7f0000000780)="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", 0x122}], 0x1) poll(0x0, 0x22, 0x3) fchdir(r2) mq_unlink(&(0x7f0000000000)='proc\x00') r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$setsig(0x4203, r3, 0x2, &(0x7f0000000440)={0x37, 0x8, 0x8}) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r5, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)=0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000380)={0x401, 0x7fffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f00000000c0)={0x2, 0x1}) setpriority(0x0, r6, 0x3) rt_tgsigqueueinfo(0x0, 0x0, 0x4080000000000016, &(0x7f00000004c0)={0x8000000, 0x6}) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f00000001c0)={0x906, 0x3}, 0x4) ptrace(0x4206, 0x0) ptrace(0x4207, 0x0) 10:08:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d307830303030303030ff00000000000000302c7375626a5f757365723d6b657972696e67002c00"]) 10:08:48 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8e000, 0x0) ioctl$TIOCNXCL(r0, 0x540d) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x20000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 10:08:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7365638212f49c6c6162656c2c4e860add7e6b837ed0b6cb6c0dfd992b7e1c4435283d0c1eabc929c327333bf20289f0a70c3fb643b54597484841042e128dcd1ce372ee30715fb52c48457a6542d2730817771d42cb7e5713bba4e627db912b5593ee802aa9e91038998bd3d7c103419b0542eba660deb65e86d7dbc56de40f73479b975e331364e50deaa1fa45a76910e0f2c31355698bf83d57e4b5020be5684b296ce1cb580126008635aced9f2ff1e5814e8e277ea36b5ff860aa39bb8a3522997a1b84fd77ccb48edbb9f1f7b40dba9c9cf751913fd7885f9a"]) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000000440)=""/149, 0x95}], 0x2, 0x100000001) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=@nat={'nat\x00', 0x1b, 0x5, 0x718, 0xf0, 0x0, 0xf0, 0x3a0, 0xf0, 0x648, 0x648, 0x648, 0x648, 0x648, 0x5, &(0x7f0000000180), {[{{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0xa, 0x9, 0x6}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x22}, @mcast2, [0xffffff00, 0xffff00, 0x1fffffe00, 0x100fffe00], [0x0, 0xffffff00, 0xffffff00, 0xfffffe01], 'bridge_slave_0\x00', 'team_slave_1\x00', {}, {}, 0x6, 0x1, 0x2, 0x2c}, 0x0, 0x268, 0x2b0, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x3, 0x4, 0x0, 0x2, 0x30, 0x2, [@dev={0xfe, 0x80, [], 0x1f}, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @broadcast}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x24}, @local, @empty, @loopback, @local, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @remote], 0xd}}, @common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'\x00', 'erspan0\x00', 0x1, 0x21fa35d022733352, 0x7, 0x6, 0x20, 0x101, 0x8, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0xe, @ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @port=0x4e24, @gre_key=0x1}}}, {{@ipv6={@remote, @local, [0xffffffff, 0xff000000, 0xff, 0xff], [0x0, 0xffffffff, 0xffffffff, 0xffffffff], 'bcsf0\x00', '\x00', {}, {0xff}, 0x3b, 0x40, 0x7, 0x1}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d6, 0x4d6, 0x5, 0x5, 0x2}}, @common=@inet=@ipcomp={0x30, 'ipcomp\x00', 0x0, {0x4d2, 0x4d3, 0xdf37cad0b7c2c50c}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x21, @ipv6=@loopback, @ipv6=@empty, @port=0x4e22, @gre_key=0xffff}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x12, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4=@local, @gre_key=0x1, @gre_key=0x9}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x778) write$P9_RXATTRWALK(r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) 10:08:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffc0, 0x0, 0x0, 0x2112142, &(0x7f0000000100)=ANY=[@ANYRES16]) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x2) bind$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @remote={[], 0x1}}, 0x12) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x400000, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000200)=@req3={0x7f, 0xff, 0x6, 0x6, 0x7, 0xfffffffc, 0x2}, 0x1c) 10:08:48 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000)={0xb}, 0x0, 0x0, 0x95d) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r3, 0x100, 0x70bd2d, 0x5dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20015}, 0x20000001) ptrace(0x4207, r0) 10:08:48 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:48 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r1) ptrace(0x4207, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f00000000c0)={0x77, 0x4, 0x0, 0xb8}, 0x10) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000000)='smaps_rollup\x00') ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f0000000540)={0x0, 0x0, 0x2080}) 10:08:50 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYRESHEX=r0]) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r4, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) recvfrom$unix(r3, &(0x7f0000000440)=""/151, 0x97, 0x10040, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r5 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000000640)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000006c0)=""/233, 0xe9}, {&(0x7f00000007c0)=""/49, 0x31}, {&(0x7f0000000800)=""/146, 0x92}, {&(0x7f00000008c0)=""/239, 0xef}, {&(0x7f00000009c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001a40)=""/4096, 0x1000}, 0x20100) connect$can_bcm(r5, &(0x7f0000002a80)={0x1d, r6}, 0x10) 10:08:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000100)='./file0/file0\x00', 0xa0, 0xbe4021fb7cd9a16d) truncate(&(0x7f0000000040)='./file0\x00', 0x52f) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x4, 0x0, 0x0, 0x20, &(0x7f0000000080)=ANY=[@ANYBLOB="7375626a5f757365723d6b657972696e67002c009ed3ca1f34f3e514cc9684708992596b102be0748421beff36035bf4d889"]) 10:08:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file1\x00', 0x1, 0x0, 0x0, 0x1041020, &(0x7f0000000280)={[{@nobh='nobh'}, {@init_itable_val={'init_itable', 0x3d, 0x7f}}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@orlov='orlov'}, {@dioread_lock='dioread_lock'}, {@test_dummy_encryption='test_dummy_encryption'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfshat={'smackfshat', 0x3d, 'nobh'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@subj_type={'subj_type', 0x3d, 'dioread_lock'}}, {@dont_measure='dont_measure'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 10:08:50 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() r1 = getpid() r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000000c0)) connect$caif(r3, &(0x7f0000000080)=@rfm={0x25, 0x8, "2bf62bc5a4cc6d8d91617d4a1200c4a7"}, 0x18) sched_setattr(r2, &(0x7f0000000000)={0x30, 0x2, 0x0, 0x9, 0x5, 0x8, 0x200000000000000}, 0x0) getpgid(r1) rt_tgsigqueueinfo(r0, 0x0, 0x33, &(0x7f00000004c0)={0xb}) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$cont(0x18, r4, 0x8, 0x3) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:08:50 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:50 executing program 1: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x240000, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)={0x129, 0x17, &(0x7f0000000540)="9c3c9c9e6709caaf7306c31086ccf3b6655b8b54f1df15a9d2bb132f9779674fbbbef6eadd509b7f154970f3ec07b2c5789f49cac078d5909633c8da9b2fab9d8955c6c5f99cf3e5fece8e2d77bed08cad7570bd979b81918a077b20dde5e4108a653d5b304f34eb6856ba6359163b94039e6bf2862d97ce1147b146c18d5ce22061f26180e0a9efe25a1aeb838bc671814977821ac9efca67dc441fb75b1be5b21c885b50e3239c58fbbcbf2caab321ba66d5550a54f5e464b3b1745cbe7d13776d9c683bd4de1f1b703917d6e1efbb7691363539f42ae97178eafaab5869ecfb9d605fbcc6d6a304c843bbc6def0f368b84fa76178f62e85ce8599c0518d07b34d15b92e8bdf75f44370254c1e379f7d2a09b981daf8fa20d2bcef59cb4659f937ce936c68fd5774511226ea3c608e2a4dea4c7dcbd1c628ff5aa98c78db8a877be1e4d003647bf175e92761730a710b6d653a0c953451181232733a625fcbd254df809d8a5e94e7f493745e35c99a12954ba6a75abb16b6c157e163df4ce782a3ce5cd8077b25f58fea1da5b9ee071cdbeb27841a5ac473dfd2e7a011677f6278fd853db766e61bf91c1ca817f68d6adb9e03c71b11e3032d360110a70164c030d50330d55875294193cb825c8489c3824a9fd7cabf47cae4395f7c2aba72a884a3fe386e089af1a5b2d7670f7e2065d15fd0c17ed65cb747779ea0fadb08d723c555e4eaeadb1ad3ccf70aab7c6d0e5c8ccfab8a453667c4f669a8814543cbd5e59260ec7bba8d02f5e9e6b6033a3746fff8121e555bd0c40af37db325fb999c8525368da51623fe9777faa1299faf999c2d0d01426254ca78c65ad1dea7ada80bcd44d744a758dc23b9402e19c4265ea9d060b334314ffb232beec5848559098028f743d9d06027b444e816a5c487cb6d8fd5ae981258be6a864c5157775de3a1e5c477005992020d4aa5719e14f5d2369520bf49f0ee971af9018d2781f3a836cf52fb067a39bd9190174b3b04032b235c30c8a469bcdb875458df3ea5eab5e4cb7f80baa1a1e5d0bceb429c3bbb2007bdc82838707736c56a3382f5313ded2db0b3e41a2f577307a448531c956fac78d0aad9ce4f8ecc4829b587bff4daaac5c8a48aaa60a7a1dccd4a973dbbd4010b1e878ad6ec3377fca04150a3ffd798a6bcbfe9c259231380d0d16da68db3e943e79e2dbb2be5a99758c887a8dcecc453cbb8ec7636a6c4f0c4e492705bd1b7628ca73cd2657a14cb7d84878812fcf5f116395d0aa98262220e684e54aed34455fdf3c80902cfbad041bcc4a12c4068af3d93392a8a8742e6cbf957c262e4c21ead7bf8c9186cc57647ac053c7169d453d3207f5330e5820b782fcb283a163e4fde290e12bd3b919ef5706433bda7d288fc64acee9af8a7f82c0e46e65b80d6dd69e5da442d8174cc71ce52c2fe"}) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e23, @broadcast}}, 0x0, 0xa8, 0x0, "612e73d045cd57530b22ab38ed1e727488b955cc2d2ed6c8e6c2bffdf574687b543f168ead17b1da088559d6de2e1f01ee174d38d95548e145e7cbd05df7c7909c926e35175f166eca8924ab3c5baf57"}, 0xd8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:50 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='3\xb5\x00\x00\x00\x00\x00\x00\xe6\xff\xff\xff\x00', 0x2, 0x0) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:08:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) [ 260.837228] EXT4-fs: 16 callbacks suppressed [ 260.837236] EXT4-fs (sda1): re-mounted. Opts: [ 260.915168] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value 10:08:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8002, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000180)='system_u:obje\t\x00_r:t_exec_\x10T\x9e\xc3\x06\xe5\xebB|f\x83pB\xbbbV\xf4=\x8fo\xea\xc9N\xcd\"`:b\x02\xff\xcb\xc9\x80\x8c\x86g\xcej\xd1\x06?\xce\r\x87\\\x86E', 0x48, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) fchdir(r0) [ 261.096358] SELinux: Context system_u:obje is not valid (left unmapped). [ 261.106896] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc0x000000000Übc ¶}m s-qnš„*× =keyring" or missing value [ 261.200738] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc0x000000000Übc ¶}m s-qnš„*× =keyring" or missing value 10:08:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d307830303030a6cec4f6e78c3f73720e2416d339302c7375626a5f757365723d6b657972696e67002c00"]) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0xffffffff, 0x400, 0x6, 0x401]}) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000140)={0xe31, 0xb1, 0x2, 0x300}) 10:08:51 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 261.371878] EXT4-fs (sda1): Unrecognized mount option "0xffffffffffffffff" or missing value [ 261.432214] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=0x0000¦ÎÄöçŒ?sr$Ó90" or missing value 10:08:51 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/42, 0x2a}, {&(0x7f0000000140)=""/2, 0x2}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000180)=""/199, 0xc7}, {&(0x7f00000002c0)=""/243, 0xf3}], 0x5, &(0x7f0000001540)=""/237, 0xed}, 0x100) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:51 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvmsg$can_raw(r1, &(0x7f0000000480)={&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000740)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000140)=""/205, 0xcd}, {&(0x7f0000000240)=""/109, 0x6d}, {&(0x7f00000002c0)=""/180, 0xb4}, {&(0x7f0000000380)=""/7, 0x7}, {&(0x7f00000003c0)=""/162, 0xa2}, {&(0x7f0000000540)=""/235, 0xeb}, {&(0x7f0000000640)=""/207, 0xcf}], 0x8, &(0x7f00000007c0)=""/207, 0xcf}, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000009c0)={@l2={0x1f, 0x1f, {0x5, 0x81, 0x3, 0x7f, 0x35, 0xc2}, 0x8000, 0x1}, {&(0x7f00000008c0)=""/144, 0x90}, &(0x7f0000000980), 0x2}, 0xa0) ptrace(0x4206, r0) ptrace(0x4207, r0) [ 261.564122] ptrace attach of ""[11979] was attempted by "/root/syz-executor.3"[12035] [ 261.604170] EXT4-fs (sda1): re-mounted. Opts: 10:08:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x59ad03fa8c9dc609, 0x0, 0x20, &(0x7f0000000500)) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000240)={0x97}, 0x1) r1 = getuid() syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x3, &(0x7f0000000340)=[{&(0x7f0000000100)="e6fbf3864e022d8be0e879d65f056a65992ea771ed347d2d7f49eae36cbe5b4323aa3e4a1354943a6d772a393fb43746cc86af264a993d2310219f5d344cfca2e4e24b3be6f82e769b603a901ca9a214e0d275ed26f910a08a44d222918e5e557b332acae187625575d6025c8f02ebf0dec94253763e3c2a72197f10df24b3a2489b4b78abb92797c2feaedfd35eaa6b56d57dc903f3b1b63481afdc0c159ffdf960", 0xa2, 0x101}, {&(0x7f00000001c0)="c9173c57d78faa024f4003a7647514c46fa352263d5a910dd322052389c1c9e5608b2452281adf423bd0e47ece6c9a947de52c601cfcda62dc1c70a2ba5cf320364a4ffcbf284c8f5c93f20d52900f594aeac3", 0x53, 0x80000000}, {&(0x7f00000002c0)="3e528ee2fa8cc2ffd62cc0235c19a7f9de9c5cb1f2dbdc7c8455c6b2244689bf90cf3247a3a600f4793bdfcefbf01b244f51bace7785ae453ed7da90ad39e0608d72b75439709d", 0x47, 0x3f}], 0x1000, &(0x7f00000003c0)={[{@norecovery='norecovery'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent', 0x3d, 0x40}}, {@localcaching='localcaching'}, {@barrier='barrier'}, {@quota_account='quota=account'}, {@quota_quantum={'quota_quantum', 0x3d, 0x10001}}], [{@obj_type={'obj_type', 0x3d, 'seclabel'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type={'obj_type', 0x3d, 'seclabel'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_gt={'uid>', r1}}, {@hash='hash'}, {@dont_measure='dont_measure'}]}) [ 261.704373] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 261.726589] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 261.799032] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:52 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4800) setsockopt$inet6_int(r0, 0x29, 0x8b, &(0x7f0000000140)=0x7, 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x5, 0x8}) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="6175746ff299b28d616c6c6f633d30782000da1c000057e930303030303030302c7375626a5f756e67002c000000f5000000000000"]) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x400000, 0x0) ioctl$void(r1, 0x5451) 10:08:52 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:52 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffb000/0x3000)=nil, 0x1000, 0x1000000, 0xcc150, r0, 0x81000000) r1 = getpid() r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x74dd, @rand_addr="266b6825dcca5deacb9f198ac49c163a", 0x7000000}, 0x1c) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000040)) rt_tgsigqueueinfo(r1, r1, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x10, r1) ptrace(0x4207, r1) 10:08:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "9a04bcdc13f3057be21ef0fcb51638bdeb4dd6c9"}, 0x15, 0x1) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$VT_RELDISP(r1, 0x5605) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="690076657273696f6e2c7365636c6162656c2c007aae9130cbc12b9fdcb4dc0e72bc380085b4c4838144dfc808c5605a0ec99d4353767cde3079a8e63eb991cfb71ecbef2c4bd408287fa95057d3ba3acbe1d531eacf896b6ca1462ae558c695444270695a8dee77726e1b6d9cb9371a95d3261ffefb3804cb9e74185a43c06a6634c60721252c5de4532fc7d81c1363723a2e291e5c86229b313e65a7b77275c627228876b37190e8569e5123c34c13641ea9"]) 10:08:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000a0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000000000,subj_user=keyRing\x00,\x00']) 10:08:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0xc0a700, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x84002, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000080)={0x2, 0x1, 0x12, 0xd, 0x1df, &(0x7f0000000540)="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"}) 10:08:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x125244, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$SNDCTL_DSP_GETCAPS(r2, 0x8004500f, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000040)={r4}, 0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r4, 0x200, 0x4}, &(0x7f0000000100)=0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) [ 262.907387] audit: type=1400 audit(1576231732.802:67): avc: denied { write } for pid=12129 comm="syz-executor.4" name="net" dev="proc" ino=44609 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 262.939315] audit: type=1400 audit(1576231732.802:68): avc: denied { add_name } for pid=12129 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 262.970407] audit: type=1400 audit(1576231732.802:69): avc: denied { create } for pid=12129 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 10:08:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0xe) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:52 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000100)={0x1, 0xaf, "96426969b4fd5d9568797a39042ca20857820a3ae9b20476e9be1740729d80cb901897dff189b2d8b4d255e3cbf19cf9cd168f566484fefc8ed1a430996257d01b3997891cf61dce62d4c20e28332c70792aa2641a9109e0fcda539d5b975dbcd054dd20481fd0f2acf0092ca2e0c9ddfc370f7e487f7f442a917cf28dd3f0ec904ed7d027a2939c587243f3ddee22c62127e3836b3514475f59ea724abdc2f6802c6296d4e5b3ece49f90616cb8f8"}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="6177746f5f64615f616c6c6f633d307830303030303030303030f9ffffffffffffff75626a5f757365723d6b657972696e67002c00"]) 10:08:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x68, 0x29, 0x2, {0x8, [{{0x1, 0x0, 0x5}, 0x391, 0x6, 0x7, './file0'}, {{0x44, 0x0, 0x7}, 0x737b, 0x1, 0x7, './file0'}, {{0x10, 0x2, 0x6}, 0x6, 0x2, 0x7, './file0'}]}}, 0x68) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:53 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:53 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() prctl$PR_CAPBSET_READ(0x17, 0x0) rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:08:53 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x16b) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x0, 0x3, 0x0, 0x0, 0x0, 0xcc6e, 0xfffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f00000001c0)=0xbd0d, 0x4) ioctl$RTC_WKALM_RD(r5, 0x80287010, &(0x7f0000000300)) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd1d5}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000240)=0x2) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r7, 0x0, 0x7fffffff}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket(0x10, 0x2, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00\"\xd6\x81I\x00\x00\x00\x05\xed\x00\x00\x00\x00/\xfaI\xce\xf0dgX\xb5\x95\xa9e\xa3\x14\xb0w\xb3\x9d\xec\xf7\xca\xf5\x1a(q\x0f\xeaf\x89\xe4\x00\xad[_\x9a\x03\xa0mh\xdd\x8eRb\x1f\xa4Z\a vo\x86\xd8\xb0\x84]\x04eDB8J`\xbe') sendfile(r8, r9, 0x0, 0x80000002) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 10:08:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0xd99, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) 10:08:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0xc, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) [ 264.002955] selinux_nlmsg_perm: 982 callbacks suppressed [ 264.008730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2405 sclass=netlink_route_socket pig=12205 comm=syz-executor.2 [ 264.030982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=30068 sclass=netlink_route_socket pig=12205 comm=syz-executor.2 10:08:54 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r7 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r8 = inotify_init1(0x0) fcntl$setown(r8, 0x8, 0xffffffffffffffff) fcntl$getownex(r8, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r9, 0x13) syz_open_procfs(r9, &(0x7f0000000040)='clear_refs\x00') r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, 0x0, 0x0) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r15 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r16, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r17}}, 0x120) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) r19 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r19, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) waitid(0x0, r22, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r22, 0x9, &(0x7f00000001c0)=""/68) r23 = getpgid(r22) r24 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r24, 0x8904, &(0x7f0000000000)=0x0) r26 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r27 = openat$cgroup_ro(r26, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r28 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r29 = getpid() r30 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r30, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r30, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r31 = gettid() waitid(0x2c7c96e4f825ad55, r31, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r32 = socket$netlink(0x10, 0x3, 0x8000000004) r33 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r33, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r30, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r32, @ANYRES64=r33, @ANYRES64], @ANYRESDEC=r31]], 0x8}}, 0x20004850) r34 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r34) kcmp(r34, r34, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r34, 0x0, 0x0) r35 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r34, r35, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r31, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r29, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r28, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r27, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, r24, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r23, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r20, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r19, 0x0, 0x1, &(0x7f0000000000)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r16, 0x0, 0x1, &(0x7f0000000500)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r14, r15, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r9, r12, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r7, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r38 = getpgrp(r37) ptrace$pokeuser(0x6, r38, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:54 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000080)=0x5) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/358]) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r1, r2, r2}, 0x0, 0x0, 0x0) r3 = request_key(0x0, &(0x7f0000000180)={'\x00', 0x0}, 0x0, 0x0) keyctl$get_keyring_id(0x0, r3, 0x0) keyctl$link(0x8, r2, r3) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 10:08:54 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000)={0x1}, 0x0, 0x0, 0xffffffffffffffea) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:08:54 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x16, @remote, 0x4e24, 0x2, 'nq\x00', 0x139ad43f04bb97c5, 0x1000, 0x59}, 0x2c) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000040)={0x7f, {0x4e68, 0x5, 0xfffffff7, 0x7, 0xfffffffa, 0x3f}}) ptrace(0x4206, r0) ptrace(0x4207, r0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r3, &(0x7f00000000c0)='statm\x00') ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x0, 0x2}) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r5, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) r6 = fcntl$getown(r4, 0x9) wait4(r6, 0x0, 0x2, &(0x7f0000000280)) 10:08:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:54 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="6190a12d60e24363616c6c6f633d30783030303030ff7f3030303030303030302c7375626a5f757365723d6b657972696e67002c00d4cb4d9dd0ffb3f76deb4d1a437f0afb794d42ba450d3bbfbbd2fe21143594f53d38ebd99443f6f3048dddec1f3d5beb7b0987aa97edb5a5889fa5"]) 10:08:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2300401, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002800)='/dev/full\x00', 0x323028202d8a23a1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000002840)=@gcm_256={{0x303}, "8a0a70945c7246ba", "3cf35dfba113eb4848b5a8a7747aa0813e7d0f5bee936f7c5bea277546abbc4a", "55ba656e", "aaa810aa436b8484"}, 0x38) 10:08:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB='i_verswon,seclabel,\x00']) 10:08:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x2, 0x0, 0x800, 0x1, 0xeb4}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d3080000000000000003030343030303030302c7375626a5f757365723d6b657972696e67002c00b6a1502e8631f1e028014a09831974f82059b777839f6f77c459c147c7d364263dcfb8342bacc3015bfa4a75ba15be05cfdd4aff04478aeea10ee6645612fa85f6715b1d25329ae8c51fcb9779a9fbe21366d8"]) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fstat(r5, &(0x7f00000009c0)) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvmsg$kcm(r4, &(0x7f0000000980)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000440)=""/250, 0xfa}, {&(0x7f0000000540)=""/221, 0xdd}, {&(0x7f0000000680)=""/101, 0x65}, {&(0x7f0000000700)}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f00000007c0)=""/166, 0xa6}], 0x6, &(0x7f0000000900)=""/71, 0x47}, 0x102) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={@rand_addr="687361d407b30c4b9cfa3e4e7adce38b", 0x55, r6}) 10:08:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:54 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r7 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r8 = inotify_init1(0x0) fcntl$setown(r8, 0x8, 0xffffffffffffffff) fcntl$getownex(r8, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r9, 0x13) syz_open_procfs(r9, &(0x7f0000000040)='clear_refs\x00') r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, 0x0, 0x0) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r15 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r16, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r17}}, 0x120) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) r19 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r19, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) waitid(0x0, r22, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r22, 0x9, &(0x7f00000001c0)=""/68) r23 = getpgid(r22) r24 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r24, 0x8904, &(0x7f0000000000)=0x0) r26 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r27 = openat$cgroup_ro(r26, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r28 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r29 = getpid() r30 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r30, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r30, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r31 = gettid() waitid(0x2c7c96e4f825ad55, r31, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r32 = socket$netlink(0x10, 0x3, 0x8000000004) r33 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r33, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r30, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r32, @ANYRES64=r33, @ANYRES64], @ANYRESDEC=r31]], 0x8}}, 0x20004850) r34 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r34) kcmp(r34, r34, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r34, 0x0, 0x0) r35 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r34, r35, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r31, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r29, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r28, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r27, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, r24, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r23, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r20, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r19, 0x0, 0x1, &(0x7f0000000000)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r16, 0x0, 0x1, &(0x7f0000000500)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r14, r15, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r9, r12, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r7, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r38 = getpgrp(r37) ptrace$pokeuser(0x6, r38, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:54 executing program 1: r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x38e) fadvise64(r0, 0x4, 0x400, 0x5) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4(r0, &(0x7f0000000100)=@l2, &(0x7f0000000080)=0x80, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:55 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x11, 0x0) ptrace(0x4207, r0) 10:08:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$smack_xattr_label(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.SMACK64EXEC\x00', &(0x7f0000000300)={'system{md5sumselinux'}, 0x15, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) setxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x20000, &(0x7f0000000100)={[{@xino_off='xino=off'}, {@metacopy_off='metacopy=off'}, {@index_off='index=off'}, {@index_on='index=on'}]}) 10:08:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x16b) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x0, 0x3, 0x0, 0x0, 0x0, 0xcc6e, 0xfffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f00000001c0)=0xbd0d, 0x4) ioctl$RTC_WKALM_RD(r5, 0x80287010, &(0x7f0000000300)) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd1d5}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000240)=0x2) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r7, 0x0, 0x7fffffff}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket(0x10, 0x2, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00\"\xd6\x81I\x00\x00\x00\x05\xed\x00\x00\x00\x00/\xfaI\xce\xf0dgX\xb5\x95\xa9e\xa3\x14\xb0w\xb3\x9d\xec\xf7\xca\xf5\x1a(q\x0f\xeaf\x89\xe4\x00\xad[_\x9a\x03\xa0mh\xdd\x8eRb\x1f\xa4Z\a vo\x86\xd8\xb0\x84]\x04eDB8J`\xbe') sendfile(r8, r9, 0x0, 0x80000002) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 10:08:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8011000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0xcc, r1, 0x21, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x26}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7e}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6a}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7d}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8000}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x8c1) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3, 0x1, 0x5, 0x3, 0x3}}) [ 265.280118] protocol 88fb is buggy, dev hsr_slave_0 [ 265.285244] protocol 88fb is buggy, dev hsr_slave_1 10:08:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="05c4a7d06162656c2c00"]) [ 265.440123] protocol 88fb is buggy, dev hsr_slave_0 [ 265.445235] protocol 88fb is buggy, dev hsr_slave_1 [ 265.489792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2405 sclass=netlink_route_socket pig=12371 comm=syz-executor.0 [ 265.510865] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=30068 sclass=netlink_route_socket pig=12371 comm=syz-executor.0 10:08:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x16b) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x0, 0x3, 0x0, 0x0, 0x0, 0xcc6e, 0xfffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f00000001c0)=0xbd0d, 0x4) ioctl$RTC_WKALM_RD(r5, 0x80287010, &(0x7f0000000300)) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd1d5}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000240)=0x2) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r7, 0x0, 0x7fffffff}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket(0x10, 0x2, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00\"\xd6\x81I\x00\x00\x00\x05\xed\x00\x00\x00\x00/\xfaI\xce\xf0dgX\xb5\x95\xa9e\xa3\x14\xb0w\xb3\x9d\xec\xf7\xca\xf5\x1a(q\x0f\xeaf\x89\xe4\x00\xad[_\x9a\x03\xa0mh\xdd\x8eRb\x1f\xa4Z\a vo\x86\xd8\xb0\x84]\x04eDB8J`\xbe') sendfile(r8, r9, 0x0, 0x80000002) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 10:08:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) connect$unix(r0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 265.872284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2405 sclass=netlink_route_socket pig=12392 comm=syz-executor.0 [ 265.893641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=30068 sclass=netlink_route_socket pig=12392 comm=syz-executor.0 [ 265.920139] protocol 88fb is buggy, dev hsr_slave_0 [ 265.925252] protocol 88fb is buggy, dev hsr_slave_1 [ 265.967439] EXT4-fs: 35 callbacks suppressed [ 265.967448] EXT4-fs (sda1): Unrecognized mount option "ħÐabel" or missing value 10:08:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8a0e09fa2cb02284) 10:08:55 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r7 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r8 = inotify_init1(0x0) fcntl$setown(r8, 0x8, 0xffffffffffffffff) fcntl$getownex(r8, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r9, 0x13) syz_open_procfs(r9, &(0x7f0000000040)='clear_refs\x00') r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, 0x0, 0x0) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r15 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r16, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r17}}, 0x120) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) r19 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r19, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) waitid(0x0, r22, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r22, 0x9, &(0x7f00000001c0)=""/68) r23 = getpgid(r22) r24 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r24, 0x8904, &(0x7f0000000000)=0x0) r26 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r27 = openat$cgroup_ro(r26, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r28 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r29 = getpid() r30 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r30, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r30, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r31 = gettid() waitid(0x2c7c96e4f825ad55, r31, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r32 = socket$netlink(0x10, 0x3, 0x8000000004) r33 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r33, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r30, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r32, @ANYRES64=r33, @ANYRES64], @ANYRESDEC=r31]], 0x8}}, 0x20004850) r34 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r34) kcmp(r34, r34, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r34, 0x0, 0x0) r35 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r34, r35, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r31, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r29, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r28, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r27, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, r24, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r23, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r20, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r19, 0x0, 0x1, &(0x7f0000000000)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r16, 0x0, 0x1, &(0x7f0000000500)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r14, r15, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r9, r12, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r7, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r38 = getpgrp(r37) ptrace$pokeuser(0x6, r38, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:55 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xfd\x1aM6\xb2|\xc5\x05\xbc\xe71Ho\xee\xec%\xe4\x80aO\x8bB\xf3-g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2P\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00\xd8\xcc\tP?\t\xc2\xd0\xc92\x92\x82)\xc3\x00\x8f!\xc1\x01`c!zk\xda\xd7\'\xf5\xa2\x94\xf43\xa5\x7fe$\xee\x9f\xf4\x10\x84\xda\xdfG\xedX\xa2\xe9_\x8d\xa4sB\x1cCl\xa37$-\xc0\x93&&\xf0J\xdcWo\x1cs\x9f') write$P9_RXATTRWALK(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x8}, &(0x7f0000000140)=0x8) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r4) ptrace(0x4207, r4) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) 10:08:55 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r7 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r8 = inotify_init1(0x0) fcntl$setown(r8, 0x8, 0xffffffffffffffff) fcntl$getownex(r8, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r9, 0x13) syz_open_procfs(r9, &(0x7f0000000040)='clear_refs\x00') r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, 0x0, 0x0) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r15 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r16, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r17}}, 0x120) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) r19 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r19, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) waitid(0x0, r22, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r22, 0x9, &(0x7f00000001c0)=""/68) r23 = getpgid(r22) r24 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r24, 0x8904, &(0x7f0000000000)=0x0) r26 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r27 = openat$cgroup_ro(r26, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r28 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r29 = getpid() r30 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r30, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r30, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r31 = gettid() waitid(0x2c7c96e4f825ad55, r31, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r32 = socket$netlink(0x10, 0x3, 0x8000000004) r33 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r33, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r30, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r32, @ANYRES64=r33, @ANYRES64], @ANYRESDEC=r31]], 0x8}}, 0x20004850) r34 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r34) kcmp(r34, r34, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r34, 0x0, 0x0) r35 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r34, r35, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r31, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r29, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r28, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r27, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, r24, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r23, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r20, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r36}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r19, 0x0, 0x1, &(0x7f0000000000)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r16, 0x0, 0x1, &(0x7f0000000500)='\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r14, r15, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r9, r12, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r36}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r36}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r7, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r38 = getpgrp(r37) ptrace$pokeuser(0x6, r38, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x2c95fc1b, 0x7fff, 0x3, {}, 0x0, 0xfffff22e}) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x40020, &(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESOCT=r1], @ANYRESOCT=0x0, @ANYRES32=0x0], @ANYRES16=r0]) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x30000, 0x0) [ 266.151554] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value [ 266.204100] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 266.239404] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 266.259652] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value [ 266.317511] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 266.341079] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0xef52c319f360af8b, 0x0) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/13, 0xd) chroot(&(0x7f0000000040)='./file0\x00') 10:08:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) r1 = accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000100)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 266.380925] EXT4-fs (sda1): Unrecognized mount option "€" or missing value [ 266.515618] EXT4-fs (sda1): Unrecognized mount option "subj_user=keyring" or missing value [ 266.559838] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:08:56 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340), &(0x7f0000000180)=[0x0, 0x0], 0x4, 0x6, 0x0, 0x2}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000200)) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 10:08:56 executing program 3: clone(0x50900000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) rt_tgsigqueueinfo(r1, r0, 0xb, &(0x7f00000004c0)={0x0, 0x0, 0x400}) ptrace(0x4206, r0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = dup(r3) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, r5, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x4, 0x746, 0x7]}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x3f, 0xef95, 0x0, 0x6]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x10) ptrace(0x4207, r0) 10:08:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:56 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 266.959729] audit: type=1400 audit(1576231736.852:70): avc: denied { sys_admin } for pid=12483 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 10:08:56 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@in={0x2, 0x0, @remote}, &(0x7f0000000240)=0x80, 0x100800) getsockname$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @initdev}, &(0x7f0000000400)=0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x190004c, &(0x7f00000002c0)={[{@xino_on='xino=on'}, {@index_off='index=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@index_off='index=off'}, {@metacopy_off='metacopy=off'}], [{@seclabel='seclabel'}]}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x2ea, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="617070ffffffff655f74797269672c00000000000000c5d7319439803f563c5aeab3f82251f3f56cc3a6318521cbcd12c9968ba733f2769d56da9d9f25880067f551535985ddce0e25c6bd75d26e99a1f83f37763ff85ed8447829c708ab91e33b28d7eec9aaa59e305ebd84011e6ec386"]) 10:08:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) [ 267.197687] IPVS: ftp: loaded support on port[0] = 21 10:08:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:57 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x800, 0x0) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, &(0x7f0000000100)=0x80, 0x80000) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r1, r2, 0x0, 0x5, &(0x7f00000004c0)='bdev\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00') preadv(r7, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f0000000200)=0x5, 0x4) r8 = dup2(0xffffffffffffffff, r7) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r12, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r13 = getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getuid() r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r17, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r17, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r20, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r20, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r21 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r22) r23 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r24, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r24, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) write$FUSE_DIRENTPLUS(r8, &(0x7f0000000880)={0x350, 0x0, 0x8, [{{0x2, 0x2, 0x6, 0x6, 0x8001, 0xa0, {0x4, 0x5, 0x8, 0x4, 0xffff, 0xfffffffffffffff8, 0x3ff, 0x80, 0x4, 0x10000, 0x55f, r10, r12, 0x4, 0xffff}}, {0x4, 0x6, 0x5, 0x7, 'syz0\x00'}}, {{0x6, 0x2, 0x1, 0x100000001, 0xffffff80, 0x688e, {0x5, 0x7, 0xfff, 0x96, 0x3, 0xfffffffffffffffe, 0x401, 0xe2, 0x9, 0x6, 0x1, r13, r14, 0x4, 0x1}}, {0x6, 0x3, 0x8, 0x8, 'ip6gre0\x00'}}, {{0x5, 0x2, 0x2, 0xb8a, 0x5, 0x7, {0x6, 0x0, 0x80, 0x7, 0x2, 0x8000, 0x5, 0xfff, 0x6, 0x8, 0x8, r15, r17, 0x4, 0xffff}}, {0x2, 0xef08, 0x8, 0x1000, '[trusted'}}, {{0x6, 0x2, 0x5e6, 0x4, 0x0, 0x2, {0x1, 0xff, 0x5, 0x2, 0x4, 0x9, 0x700, 0x5, 0x8, 0x4, 0x6, r18, r20, 0xffffffff, 0x200}}, {0x0, 0x1ff, 0x14, 0x3, 'mime_typeGPL$system}'}}, {{0x0, 0x3, 0xf, 0x8, 0xcd, 0x200, {0x1, 0xffffffff, 0x1, 0x9, 0x7fff, 0x0, 0x80000000, 0x8000, 0x2, 0xffff, 0x4, r22, r24, 0x10001, 0xff}}, {0x6, 0x2, 0x12, 0x2, ']/ppp1ppp1#trusted'}}]}, 0x350) r25 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000840)='/dev/dsp\x00', 0x100, 0x0) r26 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/mISDNtimer\x00', 0x822c01, 0x0) r27 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r27, 0x0, 0x0) r28 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r27, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r28, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) r29 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rfkill\x00', 0x440100, 0x0) r30 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r30, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) r31 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r31, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r32 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00', 0x0, 0x38}, 0x10) r33 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r33, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) r34 = gettid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r35, 0x407, 0x0) write(r35, &(0x7f0000000340), 0x41395527) fstat(r35, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r37 = getgid() r38 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r38, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) r39 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r39, 0x0, 0x0) r40 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r39, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="feefffff", @ANYRES16=r40, @ANYBLOB="000200000000fedbdf25050000000800050006000000"], 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$KVM_CREATE_DEVICE(r39, 0xc00caee0, &(0x7f0000000c40)={0x6, 0xffffffffffffffff}) r42 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r42, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r43 = getpgid(0xffffffffffffffff) r44 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r45) r46 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00') preadv(r46, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r46, 0x84, 0xc, &(0x7f0000000200)=0x5, 0x4) r47 = dup2(0xffffffffffffffff, r46) r48 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r48, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r49) r50 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r50, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r51, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r51, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r52 = getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r54 = getuid() r55 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r55, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r56, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r56, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) r58 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r59, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r59, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r60 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r61) r62 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r62, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r63, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r63, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) write$FUSE_DIRENTPLUS(r47, &(0x7f0000000880)={0x350, 0x0, 0x8, [{{0x2, 0x2, 0x6, 0x6, 0x8001, 0xa0, {0x4, 0x5, 0x8, 0x4, 0xffff, 0xfffffffffffffff8, 0x3ff, 0x80, 0x4, 0x10000, 0x55f, r49, r51, 0x4, 0xffff}}, {0x4, 0x6, 0x5, 0x7, 'syz0\x00'}}, {{0x6, 0x2, 0x1, 0x100000001, 0xffffff80, 0x688e, {0x5, 0x7, 0xfff, 0x96, 0x3, 0xfffffffffffffffe, 0x401, 0xe2, 0x9, 0x6, 0x1, r52, r53, 0x4, 0x1}}, {0x6, 0x3, 0x8, 0x8, 'ip6gre0\x00'}}, {{0x5, 0x2, 0x2, 0xb8a, 0x5, 0x7, {0x6, 0x0, 0x80, 0x7, 0x2, 0x8000, 0x5, 0xfff, 0x6, 0x8, 0x8, r54, r56, 0x4, 0xffff}}, {0x2, 0xef08, 0x8, 0x1000, '[trusted'}}, {{0x6, 0x2, 0x5e6, 0x4, 0x0, 0x2, {0x1, 0xff, 0x5, 0x2, 0x4, 0x9, 0x700, 0x5, 0x8, 0x4, 0x6, r57, r59, 0xffffffff, 0x200}}, {0x0, 0x1ff, 0x14, 0x3, 'mime_typeGPL$system}'}}, {{0x0, 0x3, 0xf, 0x8, 0xcd, 0x200, {0x1, 0xffffffff, 0x1, 0x9, 0x7fff, 0x0, 0x80000000, 0x8000, 0x2, 0xffff, 0x4, r61, r63, 0x10001, 0xff}}, {0x6, 0x2, 0x12, 0x2, ']/ppp1ppp1#trusted'}}]}, 0x350) r64 = getpid() getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)=0x0) r66 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00') preadv(r66, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r66, 0x84, 0xc, &(0x7f0000000200)=0x5, 0x4) r67 = dup2(0xffffffffffffffff, r66) r68 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r68, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r69) r70 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r70, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r71, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r71, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r72 = getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r74 = getuid() r75 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r75, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r76, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r76, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) r78 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r78, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r79, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r79, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r80 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r80, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r81) r82 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r82, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r83, @ANYBLOB='\x00', @ANYRES32=r83, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) write$FUSE_DIRENTPLUS(r67, &(0x7f0000000880)={0x350, 0x0, 0x8, [{{0x2, 0x2, 0x6, 0x6, 0x8001, 0xa0, {0x4, 0x5, 0x8, 0x4, 0xffff, 0xfffffffffffffff8, 0x3ff, 0x80, 0x4, 0x10000, 0x55f, r69, r71, 0x4, 0xffff}}, {0x4, 0x6, 0x5, 0x7, 'syz0\x00'}}, {{0x6, 0x2, 0x1, 0x100000001, 0xffffff80, 0x688e, {0x5, 0x7, 0xfff, 0x96, 0x3, 0xfffffffffffffffe, 0x401, 0xe2, 0x9, 0x6, 0x1, r72, r73, 0x4, 0x1}}, {0x6, 0x3, 0x8, 0x8, 'ip6gre0\x00'}}, {{0x5, 0x2, 0x2, 0xb8a, 0x5, 0x7, {0x6, 0x0, 0x80, 0x7, 0x2, 0x8000, 0x5, 0xfff, 0x6, 0x8, 0x8, r74, r76, 0x4, 0xffff}}, {0x2, 0xef08, 0x8, 0x1000, '[trusted'}}, {{0x6, 0x2, 0x5e6, 0x4, 0x0, 0x2, {0x1, 0xff, 0x5, 0x2, 0x4, 0x9, 0x700, 0x5, 0x8, 0x4, 0x6, r77, r79, 0xffffffff, 0x200}}, {0x0, 0x1ff, 0x14, 0x3, 'mime_typeGPL$system}'}}, {{0x0, 0x3, 0xf, 0x8, 0xcd, 0x200, {0x1, 0xffffffff, 0x1, 0x9, 0x7fff, 0x0, 0x80000000, 0x8000, 0x2, 0xffff, 0x4, r81, r83, 0x10001, 0xff}}, {0x6, 0x2, 0x12, 0x2, ']/ppp1ppp1#trusted'}}]}, 0x350) sendmmsg$unix(r0, &(0x7f0000000e00)=[{&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000001c0)="1910edf5d01e5b0a923e12f491b1ebf42bd07b56e46c26f9ff1e3369eb444c45490a2e1aba8f", 0x26}, {&(0x7f0000000200)="6c7c7df66d61b70869aff77515038dd1f3a8eb735d70068774a2093a57fd05191f227a5c1ce6cc67ad937b5c13c5ed11af5ea2ce37146b98346dc004da71dce8810b1a5a5dc103d3c1755ac01fffd5dab7b99bb5d3d3c81d2732f155be0c8c1d381053b5c21ae72e3c3791", 0x6b}, {&(0x7f00000002c0)="4b347957cb28d1c20b811606d804ace6abb08b94d3f097f63512cef252469f8f5b6f3725d4793b92dc57791479e95d3a9998d90526c3e82695cad1ce46e098c80127eadcf5faf06e9f2bf63411c1d0910185711efe347da0ad66660ddb75c10244b6a228e948aac15ff646becda52bc9382edeba740a0a15f6e4c46f730aae5ffa14029d845269330bea3269b755da95bbe83e19fe02362d0406a1a25b6d0b31911ff0567dc76ada8f039741f4b1e90f58b54d2e3e36dc6390c824d20f9fef59df98c07aa8d58f4fcb1288853bdd8abddfc763736ec3264c2e3ddfc0580d3d740ff9f95f9fd3edf7", 0xe8}, {&(0x7f00000003c0)="44e6f5f1dc5cd63cb194add06ccfa9dcdbb8439d53db1cbdba41c299125a8a90bfe251090f286158f9a8e82d0298f98847cbbef30d2ed587f648fe9e53fcaf18061800c538fb1d7f44663537ca7c00b31046e74d1b2941287e3f61303c383eac4d1447de24a49e5efc89f7a2da466b06d06862179cde3e107cc16113c9d53ceea5740b219f4319ec9e13bf8d0d277c546e09f76b20298a4e08d4269a7a042ab53a7249be52bca7678a869931afc657474053c1e80a1064a6ee4dba91269ede5021dc4df36b713e82c3a848685324807feb9df426456241aa46556f3f037ca0b61aa2", 0xe2}, {&(0x7f0000000540)="ec1daab40c5ac1847a9b8ddf69a70483bdfefacd5eb2106b96386bf97be8656cdf7b7577560d34a4000717d9b9fcf97fad507f2824f11ed7f4444ce6161041a26dfb3f38175ea86679081d0c1cf517f720d7c0fbc7dffc999acc66494ca62fcff6b0e1a151a6bfa126bd2473c637ff9b12b3d71afa3a0900e8a432a56504f4d93862517c34017b186a75753d4a2a302a581ef62a245bbaae5b5d72dfd41549c24c69d2e36c595849dba42e41ec139b7d0f7a3fc0184f516965a091ce58673105b8039075ccbc4c2f45d6f8fb1a0b11bf7aa6845c847607d1dabc8b59012352ea8f8282a422cb5b3e8d05ec2b969d50372113676c0b520ac849", 0xf9}], 0x5, &(0x7f0000000980)=[@cred={{0x1c, 0x1, 0x2, {r3, r4, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r20}}}, @rights={{0x30, 0x1, 0x1, [r25, 0xffffffffffffffff, r26, r27, r29, 0xffffffffffffffff, r30, r31]}}, @rights={{0x18, 0x1, 0x1, [r32, r33]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa0, 0x1}, {&(0x7f0000000a40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="0902810bcb7c4e54634102cb2d265ff234480cc36d5dc1f99d5130f957a716bc0446ac449e9c12c8c814c22c593ac420212f63438057c782a15859a665cab84c98cb6d6b7663be0161cb41586be278e28a4fa7f95f44b0652fddd8db7737cd4e120678dedfb53a496dad855bc0f26ec80ca62256889f361d47af555579ec12902b1da098", 0x84}], 0x1, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r34, r36, r37}}}, @rights={{0x24, 0x1, 0x1, [r38, r41, r42, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r43, r45, r56}}}, @cred={{0x1c, 0x1, 0x2, {r64, r65, r71}}}], 0x88, 0x800}], 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, &(0x7f0000000040)={0x0, 0x0, {0x0, 0xfff, 0x7fff, 0x8}}) 10:08:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:57 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) 10:08:57 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) time(&(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00', 0x0, 0x8}, 0x10) 10:08:57 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time', 0x3d, 0x10000}}, {@data_journal='data=journal'}, {@bsdgroups='bsdgroups'}], [{@seclabel='seclabel'}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x1) setreuid(0x0, r2) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000400)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0xf8cda968f8456ffc, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xeed}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@measure='measure'}, {@uid_eq={'uid', 0x3d, r6}}, {@smackfsroot={'smackfsroot', 0x3d, 'max_batch_time'}}]}}) 10:08:57 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:57 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:58 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) [ 268.111262] audit: type=1400 audit(1576231738.012:71): avc: denied { getopt } for pid=12576 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:08:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x6, 0x0, 0x0, 0x20, &(0x7f00000002c0)=ANY=[]) 10:08:58 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x119800, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000380)=0x22, 0x4) connect$rds(r2, &(0x7f0000000080)={0x2, 0x4e24, @local}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in=@multicast2, @in6=@ipv4={[], [], @remote}, 0x4e22, 0x9, 0x4e22, 0x81, 0x2, 0x20, 0x20, 0x87, 0x0, r4}, {0xd197, 0x1, 0x1, 0x9, 0x401, 0x553d, 0x5, 0x4}, {0x8, 0x60cc, 0xc52, 0xfffffffffffffff9}, 0x575, 0x6e6bbd, 0x0, 0x0, 0x67ee46c532ef1655}, {{@in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4d6, 0x3c}, 0x2, @in6=@local, 0x3504, 0x6, 0x0, 0x80, 0x1, 0x5}}, 0xe8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c2c02e4fcd4f27780677b48270e769a46b714d835474e871f8eba58346e8a00b26dd8c8aa399843e365bdbdd46cb4ab274d2ae9c9f85fe259057a91364a1fd30108550a7722cec2621110e4bab8128f121d58a95f26d7704f993eb09b8223a5baa59243a11b779794268fde7eecba1570afe7fa4926fd4b4a058be36f5a395a5cec826469e6b173616e853cf7b195a50ef87564172b090eb887ae23e67446959e77ade7d4e8ee095aa8264966a642676262509c"]) 10:08:58 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc'}}], [{@subj_user={'subj_user', 0x3d, 'keyring\x00'}}]}) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000100)={'subj_user'}, 0xa, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x80, 0x8) 10:08:58 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5, 0x4, 0x2}, 0x0) rt_tgsigqueueinfo(r0, r1, 0x19, &(0x7f00000004c0)={0xfffffffc, 0x0, 0xff}) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace(0x420e, r1) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x5}, 0x0) ptrace(0xffffffffffffffff, r3) 10:08:58 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="695f767273696f6e2c7365638a6162656c2c00"]) 10:08:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="000000f2", @ANYRES16=r1, @ANYBLOB="000200000000fedbdf25050000000800050006000000"], 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) openat$audio1(0xffffffffffffff9c, &(0x7f0000000100)='\xafd\x85v/a\x00\x00\x10\x00', 0x600001, 0x0) 10:08:58 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:08:58 executing program 1: r0 = socket$inet(0x2, 0x80801, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) fstatfs(r4, &(0x7f0000000100)=""/135) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:58 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() r1 = getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000080)={0x9, 0x49323159, 0x2, @discrete={0x8, 0x9}}) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) fdatasync(r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) rt_tgsigqueueinfo(r4, r6, 0x4080000000000016, &(0x7f00000004c0)={0x2a, 0x201}) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:08:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d30783030303030302c7375626a0000000072bd6b657972696e67002c00"]) 10:08:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setitimer(0x0, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, &(0x7f0000000200)) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000002c0)={0x8040, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001401, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x36, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYRES64]) 10:08:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:59 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x19c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:08:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000000040)=ANY=[@ANYBLOB="6175f86f5f64615f616c6f633d30070000009e301ad2323030303091b7158941fcdef3dea06a3a3010303030303030302c7101626a"]) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x400000, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000100)='syz0\x00') 10:08:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000180)=ANY=[@ANYBLOB="697412007273698efd4879bc9df2c064949db56f692c7365aea01f44b53b5c3d"]) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)) 10:08:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:08:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x2, 0x0, 0x0, 0x20, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400000, 0x0) write$P9_RWRITE(r0, &(0x7f0000000100)={0xb, 0x77, 0x1, 0x5}, 0xb) 10:08:59 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) wait4(r2, &(0x7f0000000080), 0x2, 0x0) 10:08:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[]) 10:08:59 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:09:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:09:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:09:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f63c8f42f85c7f63d30df303030303030303030303030303030302c7375626a5f757365723d6b657972696e67002c00946f0800009973df2ac25a7a73b55c0fc451020fbbcc6e0ea1bcba8dadcfa7ebd7d5c2f75ed25d154ec7eca0cde510fd88fa8fe27402fa738afec906d5d1749a5a1d655c2088599389e6fdd9d645f5dee303e5c75e6838ae2dd9c710a3958cf68974123a69faa713875c2504ba108d2af44e40f73ae463b926f7566640051a437ea4b9c6be2fbfe2e659c422e28645887c79aa645688bb2eec8dfc1c1f1ebd8582218d9f6747b3cf6c5f03ef6fa966"]) 10:09:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seslabel'}]}) 10:09:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:09:00 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0xe0) socket$bt_rfcomm(0x1f, 0x1, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000000)=0xd9) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0xfb1, 0x3f, 0x7ff, 0x80000000}) mkdir(&(0x7f0000000080)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000180)={[{@init_itable_val={'init_itable', 0x3d, 0xb}}, {@grpjquota='grpjquota='}, {@grpjquota='grpjquota='}, {@nouser_xattr='nouser_xattr'}, {@dioread_nolock='dioread_nolock'}, {@data_journal='data=journal'}, {@data_ordered='data=ordered'}, {@errors_continue='errors=continue'}], [{@seclabel='seclabel'}]}) 10:09:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="005f03000000f10000ffff7265636c6162656c2cda77a127cd4e786cd8422374c39858c256554898fce5517102e7e6cf0a7888212f8dcc13537fb6128c88a75a9862238339e893d5759e15c8b40c13d653b639ea6a756c9c8ded413c7e86dde95f9f9f4cbe71287f9776c99ad5e2517793d4534d35b30f9baf700a552d76fa04d1c55a61ef2c265c75db7140d4b5a4a7a287684a27267e5d8605a7365c7e1343d84bf7e7c8d05840b1a3fe77f51fd751b758fc8a12b2fb58ddc2a6587a12dec1ee1cc02998e67821182d7b20d19b6c3b65afbfd0ba8e95dd2b2dcec89c511e2eeda6b5494663e70f17cc059c6818bdbe259189b04ef94fd278"]) 10:09:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:09:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)=ANY=[@ANYBLOB="6175746fdc79f393388eb612e6405f30303030303030303030302c00000000007167002c00"]) 10:09:00 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000)={0x8000003}, 0x0, 0x0, 0x1) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x8, 0x1, 0x4, 0x4000, {0x77359400}, {0x8, 0x0, 0x0, 0x19, 0x7, 0x0, "8470f7da"}, 0x6, 0x2, @fd=0xffffffffffffffff, 0x4}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)={0x1000, 0x4, 0x1, 0x4, 0x36e}) ptrace(0x4206, r0) 10:09:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x80, 0x100000001}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:09:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) 10:09:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d3078300000000030303030303030303030302c7375626a5f757365723d6b657972696e67002c0085ed7659b1b5a84e334ac34b283efea7c803b646eaebd5ab498b09323fcbd65f3683e678ab53a91e0f5b504affd336b76aa653c0e2dc43174ce08d"]) 10:09:00 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:09:00 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace(0x8, r1) ptrace(0x4207, r0) [ 270.992359] EXT4-fs: 31 callbacks suppressed [ 270.992368] EXT4-fs (sda1): re-mounted. Opts: [ 271.036013] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0 10:09:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffb0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYRESDEC=0x0]) [ 271.086750] EXT4-fs (sda1): re-mounted. Opts: [ 271.093042] EXT4-fs (sda1): re-mounted. Opts: 10:09:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) [ 271.172856] EXT4-fs (sda1): re-mounted. Opts: [ 271.189298] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0 10:09:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f71756f74612c7375626a5f757365723d2e2e7404757374656447504c2d6d643573756d63707573657476626f786e6574302c00"]) [ 271.248816] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:09:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$KVM_S390_UCAS_UNMAP(r5, 0x4018ae51, &(0x7f0000000380)={0xf1, 0x401, 0x25}) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000040)={r4}, 0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={r4, @in={{0x2, 0x4e24, @local}}, 0x1e, 0x94}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r7, @in6={{0xa, 0x4e21, 0xe3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5207}}, 0x5, 0x692b}, 0x90) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:09:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@prjquota='prjquota'}], [{@seclabel='seclabel'}]}) [ 271.456956] EXT4-fs (sda1): Unrecognized mount option "subj_user=..tustedGPL-md5sumcpusetvboxnet0" or missing value [ 271.523493] EXT4-fs (sda1): re-mounted. Opts: i_version, 10:09:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) [ 271.601617] EXT4-fs (sda1): Unrecognized mount option "subj_user=..tustedGPL-md5sumcpusetvboxnet0" or missing value 10:09:01 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000001780)=[{{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000080)=""/188, 0xbc}, {&(0x7f0000000140)=""/244, 0xf4}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x3, &(0x7f0000001280)=""/210, 0xd2}, 0x7}, {{&(0x7f0000001380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001400)=""/48, 0x30}, {&(0x7f0000001440)=""/100, 0x64}, {&(0x7f00000014c0)=""/167, 0xa7}, {&(0x7f0000001580)=""/179, 0xb3}], 0x4, &(0x7f0000001680)=""/254, 0xfe}, 0x3}], 0x2, 0x20, &(0x7f0000001800)) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000001980)={'nat\x00', 0x0, 0x3, 0xef, [], 0x2, &(0x7f0000001840)=[{}, {}], &(0x7f0000001880)=""/239}, &(0x7f0000001a00)=0x78) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/vcsa\x00', 0x540180, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_getaffinity(r3, 0x8, &(0x7f0000001ac0)) write(r2, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000001a80)={r2, 0x92b, 0xaabf, r4}) mkdir(&(0x7f0000000040)='./file0\x00', 0x80) mount$bpf(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x2001001, 0x0) 10:09:01 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:09:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 10:09:01 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f0000000000)={0x0, 0x0, 0xfffffffc}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) ioctl$KVM_NMI(r1, 0xae9a) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000240)={0x0, 0x79, 0x3, 0xe, &(0x7f0000ffb000/0x2000)=nil}) read$fb(r3, &(0x7f0000000140)=""/235, 0xeb) ptrace(0x4206, r0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$RDS_RECVERR(r4, 0x114, 0x5, &(0x7f00000000c0), 0x4) ptrace(0x4207, r0) 10:09:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 10:09:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:09:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) fchmod(r2, 0x172) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000040)=0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x800, 0x0, 0x0, 0x8, &(0x7f0000000080)={[], [{@uid_lt={'uid<', r3}}]}) 10:09:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000100)=ANY=[@ANYBLOB="7247f51db8e425acb6b61f0444d09d507369676e2c7365632bf51d5d736c616218d12c0000000000a1bbab33dc418032becc1dfab9b1aa2e4288c40d9ec50307627e5eca09f963cf4e18710aecf038fa9c4d74abec4b33764c6c494bde0e8bfb433dbc2eecdcc9c92144a708ef683664670de360f3889b6d9bf80187d81d64cd00000000000000008507e48e6d8dcf5656d36727a409cb58a4c219ffffffff0000000017f5ca1d946a694b39b51483d06512afb245a9a990b43b10ada51e42875122d2c10784127b82b803566e09948d08970434c7449643bea2a17c14"]) 10:09:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:09:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:09:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20ea, &(0x7f0000000100)={[{@nobarrier='nobarrier'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xaa}}, {@discard='discard'}], [{@pcr={'pcr', 0x3d, 0x23}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x4048045) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x5, 0x4) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000640)=0x10001) recvmmsg(r2, &(0x7f0000000600), 0x4000000000002a5, 0x2, 0x0) 10:09:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x6091a747fbaca93a, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x103080, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000140)={r1, 0x2, 0x9, r2}) 10:09:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}]}) [ 272.688196] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16519: comm syz-executor.0: corrupted in-inode xattr [ 272.743744] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16519: comm syz-executor.0: corrupted in-inode xattr 10:09:02 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:09:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="6175746f5f1c0000006c6c6f633d3078303030303030303030303030303030302c7375626a5f757365723d6b657972696e67002c00a5f81f15c0f108c463fd4eede97ecfab5c38ff49c3fe9ef326feef9e6397c826980bd665c9a8114c30ca2f9ce462258bd367f9aa300e152aa3c1cf114074c1743476113c1fd040"]) signalfd(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffff8}, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000180)=0x83f) 10:09:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20a0030, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) 10:09:02 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000040)=0x200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[], [{@seclabel='seclabel'}]}) 10:09:02 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpgid(r1) rt_tgsigqueueinfo(r2, r0, 0x4080000000000016, &(0x7f00000004c0)={0x3, 0x4000}) ptrace(0x4206, r0) 10:09:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@prjquota='prjquota'}]}) [ 272.843327] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16507: comm syz-executor.4: corrupted in-inode xattr [ 272.856693] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16519: comm syz-executor.0: corrupted xattr entries [ 272.874144] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16595: comm syz-executor.1: corrupted xattr entries [ 272.901716] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16613: comm syz-executor.3: corrupted xattr entries [ 272.915208] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16626: comm syz-executor.5: corrupted xattr entries [ 272.939284] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16519: comm syz-executor.1: corrupted xattr entries 10:09:02 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x18, &(0x7f00000004c0)={0x1, 0x0, 0x20000}) ptrace(0x4206, r0) ptrace(0x4207, r0) [ 272.951292] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16507: comm syz-executor.4: corrupted in-inode xattr [ 272.981838] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16626: comm syz-executor.5: corrupted xattr entries 10:09:02 executing program 3: clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4080000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4207, r0) 10:09:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='team0\x00', 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'seclabel'}}]}) 10:09:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005580)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)=""/49, 0x31}, {&(0x7f0000000140)=""/247, 0xf7}, {&(0x7f00000002c0)=""/90, 0x5a}, {&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f0000000240)=""/41, 0x29}, {&(0x7f00000003c0)=""/65, 0x41}, {&(0x7f0000000440)=""/18, 0x12}, {&(0x7f00000058c0)=""/4102, 0x1006}], 0x8, &(0x7f0000001540)=""/234, 0xea}, 0x1}, {{&(0x7f0000001640)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000002780)=[{&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/134, 0x86}], 0x2, &(0x7f00000027c0)=""/161, 0xa1}, 0x2}, {{&(0x7f0000002880)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002900)=""/97, 0x61}, {&(0x7f0000002980)=""/82, 0x52}, {&(0x7f0000002a00)=""/234, 0xea}, {&(0x7f0000002b00)=""/126, 0x7e}], 0x4}, 0xe97}, {{&(0x7f0000002bc0)=@sco, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002c40)=""/206, 0xce}, {&(0x7f0000002d40)=""/39, 0x27}, {&(0x7f0000002d80)=""/167, 0xa7}, {&(0x7f0000002e40)=""/7, 0x7}], 0x4, &(0x7f0000002ec0)=""/141, 0x8d}, 0x847}, {{&(0x7f0000002f80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000003500)=[{&(0x7f0000003000)=""/204, 0xcc}, {&(0x7f0000003100)=""/128, 0x80}, {&(0x7f0000003180)=""/152, 0x98}, {&(0x7f0000003240)=""/9, 0x9}, {&(0x7f0000003280)=""/95, 0x5f}, {&(0x7f0000003300)=""/218, 0xda}, {&(0x7f0000003400)=""/224, 0xe0}], 0x7, &(0x7f0000003580)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000004580)=@un=@abs, 0x80, &(0x7f0000004900)=[{&(0x7f0000004600)=""/228, 0xe4}, {&(0x7f0000004700)=""/175, 0xaf}, {&(0x7f00000047c0)}, {&(0x7f0000004800)=""/71, 0x47}, {&(0x7f0000004880)=""/111, 0x6f}], 0x5}, 0x80000000}, {{&(0x7f0000004980)=@pppol2tpv3, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004a00)=""/176, 0xb0}], 0x1, &(0x7f0000004b00)=""/73, 0x49}, 0x8}, {{&(0x7f0000004b80)=@alg, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000004c00)=""/154, 0x9a}, {&(0x7f0000004cc0)=""/5, 0x5}, {&(0x7f0000004d00)=""/194, 0xc2}, {&(0x7f0000004e00)=""/167, 0xa7}], 0x4, &(0x7f0000004f00)=""/28, 0x1c}, 0xe0}, {{0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000004f40)=""/249, 0xf9}, {&(0x7f0000005040)=""/133, 0x85}, {&(0x7f0000005100)=""/148, 0x94}, {&(0x7f00000051c0)=""/121, 0x79}, {&(0x7f0000005240)=""/92, 0x5c}, {&(0x7f00000052c0)=""/93, 0x5d}, {&(0x7f0000005340)=""/172, 0xac}], 0x7, &(0x7f0000005480)=""/202, 0xca}, 0x5}], 0x9, 0x2, &(0x7f00000057c0)={0x0, 0x1c9c380}) connect$x25(r1, &(0x7f0000005800)={0x9, @null=' \x00'}, 0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000500), &(0x7f00000047c0)=0x30) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x84dee522f7bc8570, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r2, 0x4147, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000005840)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d30785fda303030303030303030303030303030302c7375626a5f754b33cbcbce98685cefa8f90416117365723d6bbab11a3ff33d20942f657972696e67002c004d1c891023b93c4a6dbac296dd2ff2f0c82bbd2c0e33ff9b2363fa1db84700bfaae674de780b026d921e6d"]) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000540)) 10:09:03 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpgrp(0x0) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r9 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r11, 0x13) syz_open_procfs(r11, &(0x7f0000000040)='clear_refs\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, 0x0, 0x0) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r17 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r18, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r19}}, 0x120) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) r21 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r21, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r22 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r23 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r23, 0x0, 0x0) r24 = getpgrp(0x0) waitid(0x0, r24, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r24, 0x9, &(0x7f00000001c0)=""/68) r25 = getpgid(r24) r26 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r26, 0x8904, &(0x7f0000000000)=0x0) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r29 = openat$cgroup_ro(r28, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r30 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r31 = getpid() r32 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r32, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r33 = gettid() waitid(0x2c7c96e4f825ad55, r33, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r34 = socket$netlink(0x10, 0x3, 0x8000000004) r35 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r35, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r32, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e534e7e09bebd3d27f30dc822a8817e3e56d4ecc913d42160f7185ac42c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r34, @ANYRES64=r35, @ANYRES64], @ANYRESDEC=r33]], 0x8}}, 0x20004850) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r33, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r30, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r29, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, r26, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r25, r23, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r22, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x1, &(0x7f0000000000)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r18, 0x0, 0x1, &(0x7f0000000500)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, r17, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r14, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r4, 0x0, 0x8, &(0x7f0000000040)='seclabel', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='i_version'}, 0x30) r40 = getpgrp(r39) ptrace$pokeuser(0x6, r40, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000500)={[{@i_version='i_version'}], [{@seclabel='seclabel'}]}) [ 273.893303] device bridge_slave_1 left promiscuous mode [ 273.898843] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.952920] device bridge_slave_0 left promiscuous mode [ 273.958530] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.093805] device hsr_slave_1 left promiscuous mode [ 274.134522] device hsr_slave_0 left promiscuous mode [ 274.176189] team0 (unregistering): Port device team_slave_1 removed [ 274.202317] team0 (unregistering): Port device team_slave_0 removed [ 274.223734] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 274.294039] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 274.416690] bond0 (unregistering): Released all slaves [ 277.971472] EXT4-fs error: 32 callbacks suppressed [ 277.971481] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16964: comm syz-fuzzer: corrupted xattr entries [ 278.133437] bridge0: port 3(gretap0) entered disabled state [ 278.152555] device gretap0 left promiscuous mode [ 278.157398] bridge0: port 3(gretap0) entered disabled state [ 278.332814] bridge0: port 3(gretap0) entered disabled state [ 278.343084] device gretap0 left promiscuous mode [ 278.347899] bridge0: port 3(gretap0) entered disabled state [ 278.443489] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16965: comm syz-fuzzer: corrupted in-inode xattr [ 278.462219] EXT4-fs error (device sda1): ext4_xattr_ibody_find:2191: inode #16965: comm restorecond: corrupted in-inode xattr [ 278.798825] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16965: comm syz-fuzzer: corrupted xattr entries [ 278.813245] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16965: comm syz-fuzzer: corrupted xattr entries [ 278.836548] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16965: comm syz-fuzzer: corrupted xattr entries [ 278.950920] device bridge_slave_1 left promiscuous mode [ 278.956450] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.010837] device bridge_slave_0 left promiscuous mode [ 279.016381] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.071463] device bridge_slave_1 left promiscuous mode [ 279.077065] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.130967] device bridge_slave_0 left promiscuous mode [ 279.139539] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.201679] device bridge_slave_1 left promiscuous mode [ 279.209656] EXT4-fs error (device sda1): ext4_xattr_ibody_find:2191: inode #16966: comm restorecond: corrupted in-inode xattr [ 279.210657] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.228019] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16966: comm syz-fuzzer: corrupted in-inode xattr [ 279.270852] device bridge_slave_0 left promiscuous mode [ 279.276375] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.331404] device bridge_slave_1 left promiscuous mode [ 279.339999] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.393784] device bridge_slave_0 left promiscuous mode [ 279.399406] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.579243] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16966: comm syz-fuzzer: corrupted xattr entries [ 279.711899] device hsr_slave_1 left promiscuous mode [ 279.773016] device hsr_slave_0 left promiscuous mode [ 279.834624] team0 (unregistering): Port device team_slave_1 removed [ 279.853860] team0 (unregistering): Port device team_slave_0 removed [ 279.872562] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 279.914910] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 279.923776] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16966: comm syz-fuzzer: corrupted xattr entries [ 280.019040] bond0 (unregistering): Released all slaves [ 280.132196] device hsr_slave_1 left promiscuous mode [ 280.173200] device hsr_slave_0 left promiscuous mode [ 280.213895] team0 (unregistering): Port device team_slave_1 removed [ 280.233997] team0 (unregistering): Port device team_slave_0 removed [ 280.261574] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 280.313990] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 280.426327] bond0 (unregistering): Released all slaves [ 280.542417] device hsr_slave_1 left promiscuous mode [ 280.604249] device hsr_slave_0 left promiscuous mode [ 280.667922] team0 (unregistering): Port device team_slave_1 removed [ 280.692285] team0 (unregistering): Port device team_slave_0 removed [ 280.720154] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 280.757313] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 280.847813] bond0 (unregistering): Released all slaves [ 280.899811] bond2 (unregistering): Released all slaves [ 280.927770] bond1 (unregistering): Released all slaves [ 280.982112] device hsr_slave_1 left promiscuous mode [ 281.043347] device hsr_slave_0 left promiscuous mode [ 281.103280] team0 (unregistering): Port device team_slave_1 removed [ 281.124402] team0 (unregistering): Port device team_slave_0 removed [ 281.151540] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 281.205218] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 281.325907] bond0 (unregistering): Released all slaves [ 283.424143] EXT4-fs error: 17 callbacks suppressed [ 283.424152] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16971: comm syz-fuzzer: corrupted in-inode xattr [ 283.442045] EXT4-fs error (device sda1): ext4_xattr_ibody_find:2191: inode #16971: comm restorecond: corrupted in-inode xattr [ 283.793387] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16971: comm syz-fuzzer: corrupted xattr entries [ 283.807651] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16971: comm syz-fuzzer: corrupted xattr entries [ 283.831735] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16971: comm syz-fuzzer: corrupted xattr entries [ 284.070726] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16971: comm syz-fuzzer: corrupted xattr entries [ 284.387517] EXT4-fs error (device sda1): ext4_xattr_ibody_find:2191: inode #16972: comm restorecond: corrupted in-inode xattr [ 284.401633] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16972: comm syz-fuzzer: corrupted in-inode xattr [ 284.749139] EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16972: comm syz-fuzzer: corrupted xattr entries [ 285.138677] EXT4-fs error (device sda1): ext4_xattr_ibody_get:590: inode #16973: comm syz-fuzzer: corrupted in-inode xattr [ 288.258324] ================================================================== [ 288.266200] BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x3149/0x3230 [ 288.273389] Read of size 4 at addr ffff8880890b102e by task syz-fuzzer/7058 [ 288.280486] [ 288.282118] CPU: 1 PID: 7058 Comm: syz-fuzzer Not tainted 4.14.158-syzkaller #0 [ 288.289680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.299038] Call Trace: [ 288.301634] dump_stack+0x142/0x197 [ 288.305422] ? ext4_xattr_set_entry+0x3149/0x3230 [ 288.310273] print_address_description.cold+0x7c/0x1dc [ 288.315556] ? ext4_xattr_set_entry+0x3149/0x3230 [ 288.320404] kasan_report.cold+0xa9/0x2af [ 288.324556] __asan_report_load4_noabort+0x14/0x20 [ 288.329623] ext4_xattr_set_entry+0x3149/0x3230 [ 288.334478] ? save_trace+0x290/0x290 [ 288.338291] ? ext4_xattr_inode_read+0x3d0/0x3d0 [ 288.343050] ? __might_sleep+0x93/0xb0 [ 288.346937] ext4_xattr_ibody_set+0x7a/0x2a0 [ 288.351341] ext4_xattr_set_handle+0x4f5/0xda0 [ 288.355921] ? ext4_xattr_ibody_inline_set+0x2a0/0x2a0 [ 288.361189] ? security_load_policycaps+0x320/0x320 [ 288.366201] ? _raw_read_unlock+0x2d/0x50 [ 288.370432] ? security_sid_to_context_force+0x2b/0x40 [ 288.375697] ext4_initxattrs+0xc0/0x130 [ 288.379659] security_inode_init_security+0x26d/0x360 [ 288.384915] ? ext4_init_acl+0x1f0/0x1f0 [ 288.388961] ? security_kernel_post_read_file+0xd0/0xd0 [ 288.394309] ? posix_acl_create+0xf5/0x3a0 [ 288.398530] ? ext4_set_acl+0x400/0x400 [ 288.402485] ? lock_downgrade+0x740/0x740 [ 288.406616] ext4_init_security+0x34/0x40 [ 288.410748] __ext4_new_inode+0x3385/0x4860 [ 288.415086] ? ext4_free_inode+0x1210/0x1210 [ 288.419493] ? dquot_get_next_dqblk+0x160/0x160 [ 288.424161] ext4_mkdir+0x331/0xc20 [ 288.427814] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 288.432480] ? security_inode_mkdir+0xd0/0x110 [ 288.437048] vfs_mkdir+0x3ca/0x610 [ 288.440575] SyS_mkdirat+0x1c2/0x210 [ 288.444286] ? SyS_mknod+0x3b0/0x3b0 [ 288.447985] ? do_syscall_64+0x53/0x640 [ 288.451946] ? SyS_mknod+0x3b0/0x3b0 [ 288.455643] do_syscall_64+0x1e8/0x640 [ 288.459531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.464367] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.469535] RIP: 0033:0x47c530 [ 288.472717] RSP: 002b:000000c432b9f8e8 EFLAGS: 00000212 ORIG_RAX: 0000000000000102 [ 288.480426] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c530 [ 288.487685] RDX: 00000000000001c0 RSI: 000000c420604fc0 RDI: ffffffffffffff9c [ 288.494949] RBP: 000000c432b9f948 R08: 0000000000000000 R09: 0000000000000000 [ 288.502213] R10: 0000000000000000 R11: 0000000000000212 R12: ffffffffffffffff [ 288.509465] R13: 000000000000007f R14: 000000000000007e R15: 0000000000000100 [ 288.516726] [ 288.518332] The buggy address belongs to the page: [ 288.523258] page:ffffea0002242c40 count:0 mapcount:-127 mapping: (null) index:0x1 [ 288.531642] flags: 0xfffe0000000000() [ 288.535425] raw: 00fffe0000000000 0000000000000000 0000000000000001 00000000ffffff80 [ 288.543286] raw: ffffea0001a61d20 ffffea0001f9a1a0 0000000000000000 0000000000000000 [ 288.551145] page dumped because: kasan: bad access detected [ 288.556832] [ 288.558440] Memory state around the buggy address: [ 288.563349] ffff8880890b0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 288.570686] ffff8880890b0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 288.578035] >ffff8880890b1000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 288.585371] ^ [ 288.590019] ffff8880890b1080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 288.597358] ffff8880890b1100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 288.604697] ================================================================== [ 288.612043] Disabling lock debugging due to kernel taint [ 288.617998] Kernel panic - not syncing: panic_on_warn set ... [ 288.617998] [ 288.625375] CPU: 1 PID: 7058 Comm: syz-fuzzer Tainted: G B 4.14.158-syzkaller #0 [ 288.634017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.643348] Call Trace: [ 288.645920] dump_stack+0x142/0x197 [ 288.649527] ? ext4_xattr_set_entry+0x3149/0x3230 [ 288.654346] panic+0x1f9/0x42d [ 288.657528] ? add_taint.cold+0x16/0x16 [ 288.661487] ? ___preempt_schedule+0x16/0x18 [ 288.665878] kasan_end_report+0x47/0x4f [ 288.669832] kasan_report.cold+0x130/0x2af [ 288.674048] __asan_report_load4_noabort+0x14/0x20 [ 288.678956] ext4_xattr_set_entry+0x3149/0x3230 [ 288.683606] ? save_trace+0x290/0x290 [ 288.687388] ? ext4_xattr_inode_read+0x3d0/0x3d0 [ 288.692124] ? __might_sleep+0x93/0xb0 [ 288.695992] ext4_xattr_ibody_set+0x7a/0x2a0 [ 288.700378] ext4_xattr_set_handle+0x4f5/0xda0 [ 288.704938] ? ext4_xattr_ibody_inline_set+0x2a0/0x2a0 [ 288.710192] ? security_load_policycaps+0x320/0x320 [ 288.715187] ? _raw_read_unlock+0x2d/0x50 [ 288.719313] ? security_sid_to_context_force+0x2b/0x40 [ 288.724570] ext4_initxattrs+0xc0/0x130 [ 288.728526] security_inode_init_security+0x26d/0x360 [ 288.733692] ? ext4_init_acl+0x1f0/0x1f0 [ 288.737753] ? security_kernel_post_read_file+0xd0/0xd0 [ 288.743096] ? posix_acl_create+0xf5/0x3a0 [ 288.747312] ? ext4_set_acl+0x400/0x400 [ 288.751265] ? lock_downgrade+0x740/0x740 [ 288.755488] ext4_init_security+0x34/0x40 [ 288.759722] __ext4_new_inode+0x3385/0x4860 [ 288.764043] ? ext4_free_inode+0x1210/0x1210 [ 288.768448] ? dquot_get_next_dqblk+0x160/0x160 [ 288.773134] ext4_mkdir+0x331/0xc20 [ 288.776750] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 288.781402] ? security_inode_mkdir+0xd0/0x110 [ 288.785968] vfs_mkdir+0x3ca/0x610 [ 288.789490] SyS_mkdirat+0x1c2/0x210 [ 288.793185] ? SyS_mknod+0x3b0/0x3b0 [ 288.796880] ? do_syscall_64+0x53/0x640 [ 288.800836] ? SyS_mknod+0x3b0/0x3b0 [ 288.804540] do_syscall_64+0x1e8/0x640 [ 288.808407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.813246] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.818418] RIP: 0033:0x47c530 [ 288.821600] RSP: 002b:000000c432b9f8e8 EFLAGS: 00000212 ORIG_RAX: 0000000000000102 [ 288.829286] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c530 [ 288.836538] RDX: 00000000000001c0 RSI: 000000c420604fc0 RDI: ffffffffffffff9c [ 288.843800] RBP: 000000c432b9f948 R08: 0000000000000000 R09: 0000000000000000 [ 288.851061] R10: 0000000000000000 R11: 0000000000000212 R12: ffffffffffffffff [ 288.858310] R13: 000000000000007f R14: 000000000000007e R15: 0000000000000100 [ 288.867363] Kernel Offset: disabled [ 288.871012] Rebooting in 86400 seconds..