0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x1c, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x8b000}, {0x6}]}) 21:14:14 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000130000000000", 0x1c) [ 929.665318][ T4073] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4073 comm=syz-executor.2 21:14:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x8c000}, {0x6}]}) 21:14:14 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000140000000000", 0x1c) 21:14:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x8d000}, {0x6}]}) 21:14:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x8e000}, {0x6}]}) [ 930.418584][ T22] kauditd_printk_skb: 12 callbacks suppressed [ 930.418594][ T22] audit: type=1326 audit(1580591655.482:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4061 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 930.480498][ T22] audit: type=1326 audit(1580591655.512:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4064 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x8f000}, {0x6}]}) 21:14:15 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000150000000000", 0x1c) 21:14:15 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x45, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x1d, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:15 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) [ 930.573009][ T22] audit: type=1326 audit(1580591655.632:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4090 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x90000}, {0x6}]}) 21:14:15 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000160000000000", 0x1c) [ 930.618919][ T22] audit: type=1326 audit(1580591655.672:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4095 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 930.645347][ T4101] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4101 comm=syz-executor.2 21:14:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x91000}, {0x6}]}) 21:14:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x93000}, {0x6}]}) 21:14:15 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000170000000000", 0x1c) 21:14:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x95000}, {0x6}]}) 21:14:15 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000180000000000", 0x1c) 21:14:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x97000}, {0x6}]}) [ 931.379760][ T22] audit: type=1326 audit(1580591656.442:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4090 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 931.450999][ T22] audit: type=1326 audit(1580591656.472:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4095 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:16 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x99000}, {0x6}]}) 21:14:16 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000190000000000", 0x1c) 21:14:16 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x48, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x21, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x4c, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x24, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x9b000}, {0x6}]}) [ 931.680665][ T22] audit: type=1326 audit(1580591656.742:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4134 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 931.692282][ T4139] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4139 comm=syz-executor.2 21:14:16 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001a0000000000", 0x1c) 21:14:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x9d000}, {0x6}]}) [ 931.741088][ T22] audit: type=1326 audit(1580591656.782:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4137 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:16 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001b0000000000", 0x1c) [ 932.479288][ T22] audit: type=1326 audit(1580591657.542:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4134 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 932.544333][ T22] audit: type=1326 audit(1580591657.582:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4137 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:17 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:17 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001c0000000000", 0x1c) 21:14:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x9f000}, {0x6}]}) 21:14:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x25, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x4d, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa1000}, {0x6}]}) 21:14:17 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001d0000000000", 0x1c) 21:14:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa3000}, {0x6}]}) [ 932.683617][ T4166] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4166 comm=syz-executor.2 21:14:17 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001e0000000000", 0x1c) 21:14:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa5000}, {0x6}]}) 21:14:17 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001f0000000000", 0x1c) 21:14:18 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000200000000000", 0x1c) 21:14:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa7000}, {0x6}]}) 21:14:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x28, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x50, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:18 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffff0f, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x54, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x2c, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa9000}, {0x6}]}) 21:14:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xab000}, {0x6}]}) 21:14:18 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000210000000000", 0x1c) [ 933.665297][ T4194] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4194 comm=syz-executor.2 21:14:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xad000}, {0x6}]}) 21:14:18 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000220000000000", 0x1c) 21:14:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xaf000}, {0x6}]}) 21:14:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb1000}, {0x6}]}) 21:14:19 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000230000000000", 0x1c) 21:14:19 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x2d, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x5c, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb3000}, {0x6}]}) [ 934.564329][ T4221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4221 comm=syz-executor.2 21:14:19 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000240000000000", 0x1c) 21:14:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb5000}, {0x6}]}) 21:14:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb7000}, {0x6}]}) 21:14:19 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000250000000000", 0x1c) 21:14:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb9000}, {0x6}]}) 21:14:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:20 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000260000000000", 0x1c) 21:14:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xbb000}, {0x6}]}) [ 935.455322][ T4250] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4250 comm=syz-executor.2 21:14:20 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0xa}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:20 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000270000000000", 0x1c) 21:14:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xbd000}, {0x6}]}) 21:14:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x60, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x30, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x61, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x34, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xbf000}, {0x6}]}) [ 935.581783][ T4259] EXT4-fs (sda1): Unrecognized mount option "min_batch_time [ 935.581783][ T4259] 0x0000000000000000" or missing value [ 935.608439][ T22] kauditd_printk_skb: 12 callbacks suppressed 21:14:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x64, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 935.608448][ T22] audit: type=1326 audit(1580591660.672:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4264 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 935.708923][ T4270] EXT4-fs (sda1): Unrecognized mount option "min_batch_time [ 935.708923][ T4270] 0x0000000000000000" or missing value 21:14:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:21 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000280000000000", 0x1c) 21:14:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc1000}, {0x6}]}) 21:14:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6c, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:21 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x22}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc3000}, {0x6}]}) 21:14:21 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000290000000000", 0x1c) [ 936.269396][ T22] audit: type=1326 audit(1580591661.332:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4274 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 936.310281][ T4279] EXT4-fs (sda1): Unrecognized mount option "min_batch_time"0x0000000000000000" or missing value 21:14:21 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002a0000000000", 0x1c) 21:14:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc5000}, {0x6}]}) [ 936.389346][ T4287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4287 comm=syz-executor.2 [ 936.410142][ T22] audit: type=1326 audit(1580591661.472:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4264 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x35, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc7000}, {0x6}]}) [ 936.441293][ T4291] EXT4-fs (sda1): Unrecognized mount option "min_batch_time"0x0000000000000000" or missing value 21:14:21 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002b0000000000", 0x1c) [ 936.488330][ T22] audit: type=1326 audit(1580591661.552:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4294 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 937.074273][ T22] audit: type=1326 audit(1580591662.142:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4274 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:22 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc9000}, {0x6}]}) 21:14:22 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002c0000000000", 0x1c) 21:14:22 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x25}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x74, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x7c, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xcb000}, {0x6}]}) [ 937.230548][ T4305] EXT4-fs (sda1): Unrecognized mount option "min_batch_time%0x0000000000000000" or missing value 21:14:22 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002d0000000000", 0x1c) [ 937.257501][ T22] audit: type=1326 audit(1580591662.322:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4313 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 937.288316][ T4315] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4315 comm=syz-executor.2 21:14:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xcd000}, {0x6}]}) 21:14:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x3c, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) [ 937.317099][ T22] audit: type=1326 audit(1580591662.372:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4294 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 937.357383][ T4319] EXT4-fs (sda1): Unrecognized mount option "min_batch_time%0x0000000000000000" or missing value 21:14:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xcf000}, {0x6}]}) 21:14:22 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002e0000000000", 0x1c) [ 937.399329][ T22] audit: type=1326 audit(1580591662.452:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4324 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 938.063243][ T22] audit: type=1326 audit(1580591663.122:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4313 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd1000}, {0x6}]}) 21:14:23 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002f0000000000", 0x1c) 21:14:23 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x2c}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x84, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd3000}, {0x6}]}) [ 938.142708][ T22] audit: type=1326 audit(1580591663.202:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4332 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 938.170084][ T4336] EXT4-fs (sda1): Unrecognized mount option "min_batch_time" or missing value 21:14:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd5000}, {0x6}]}) 21:14:23 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000300000000000", 0x1c) 21:14:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x3d, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) [ 938.214370][ T4346] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4346 comm=syz-executor.2 21:14:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd7000}, {0x6}]}) 21:14:23 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000400000000000", 0x1c) [ 938.279683][ T4349] EXT4-fs (sda1): Unrecognized mount option "min_batch_time" or missing value 21:14:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd9000}, {0x6}]}) 21:14:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:24 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xdb000}, {0x6}]}) 21:14:24 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000caf0000000000", 0x1c) 21:14:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x87, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xdd000}, {0x6}]}) 21:14:24 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000ec00000000000", 0x1c) [ 939.049141][ T4365] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000002,max_batch_time=0x0000000000000000, 21:14:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xdf000}, {0x6}]}) 21:14:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x44, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) [ 939.111860][ T4376] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000002,max_batch_time=0x0000000000000000, [ 939.123377][ T4378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4378 comm=syz-executor.2 21:14:24 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x3}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe1000}, {0x6}]}) 21:14:24 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000d20000000000", 0x1c) 21:14:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe3000}, {0x6}]}) 21:14:25 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:25 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000400300000000", 0x1c) 21:14:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x94, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x9c, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe5000}, {0x6}]}) 21:14:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0xa4, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x45, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:25 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000034000000000", 0x1c) 21:14:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe7000}, {0x6}]}) 21:14:25 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@max_batch_time={'max_batch_time'}}]}) [ 940.027476][ T4413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4413 comm=syz-executor.2 21:14:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe9000}, {0x6}]}) 21:14:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:25 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:25 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000001000000", 0x1c) 21:14:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xeb000}, {0x6}]}) [ 940.856418][ T4431] EXT4-fs: 6 callbacks suppressed [ 940.856427][ T4431] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000006,max_batch_time=0x0000000000000000, [ 940.876250][ T22] kauditd_printk_skb: 10 callbacks suppressed 21:14:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x48, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0xac, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 940.876258][ T22] audit: type=1326 audit(1580591665.942:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4414 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 940.913314][ T4440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4440 comm=syz-executor.2 21:14:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xed000}, {0x6}]}) 21:14:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000002000000", 0x1c) 21:14:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x4c, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xef000}, {0x6}]}) [ 940.958585][ T22] audit: type=1326 audit(1580591665.942:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4415 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf1000}, {0x6}]}) [ 941.013816][ T4448] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000006,max_batch_time=0x0000000000000000, [ 941.014664][ T22] audit: type=1326 audit(1580591666.012:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4442 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:26 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x7}}, {@max_batch_time={'max_batch_time'}}]}) [ 941.098921][ T22] audit: type=1326 audit(1580591666.122:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4450 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 941.163595][ T4459] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000007,max_batch_time=0x0000000000000000, [ 941.270332][ T4461] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000007,max_batch_time=0x0000000000000000, 21:14:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000003000000", 0x1c) 21:14:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf3000}, {0x6}]}) 21:14:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:14:26 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x8}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf5000}, {0x6}]}) 21:14:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0xb1, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 941.736058][ T4466] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000008,max_batch_time=0x0000000000000000, [ 941.754487][ T22] audit: type=1326 audit(1580591666.822:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4442 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000004000000", 0x1c) [ 941.832893][ T4476] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000008,max_batch_time=0x0000000000000000, [ 941.844412][ T4479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4479 comm=syz-executor.2 [ 941.858557][ T22] audit: type=1326 audit(1580591666.922:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4450 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf7000}, {0x6}]}) 21:14:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x4d, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf9000}, {0x6}]}) 21:14:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x2, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x9}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000005000000", 0x1c) [ 941.963750][ T22] audit: type=1326 audit(1580591667.022:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4489 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 942.030378][ T4495] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000009,max_batch_time=0x0000000000000000, [ 942.100320][ T4499] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000009,max_batch_time=0x0000000000000000, 21:14:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x4, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xfb000}, {0x6}]}) 21:14:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:14:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000006000000", 0x1c) 21:14:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xa}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x8, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 942.701191][ T4505] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000000000a,max_batch_time=0x0000000000000000, [ 942.745419][ T4514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4514 comm=syz-executor.2 [ 942.766056][ T22] audit: type=1326 audit(1580591667.832:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4489 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x50, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xfd000}, {0x6}]}) 21:14:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000007000000", 0x1c) 21:14:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x36, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 942.791826][ T4515] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000000000a,max_batch_time=0x0000000000000000, 21:14:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xff000}, {0x6}]}) 21:14:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xb}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0xb4, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:14:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000008000000", 0x1c) 21:14:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x54, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100000}, {0x6}]}) 21:14:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xc}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x2, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100100}, {0x6}]}) [ 943.560699][ T22] audit: type=1326 audit(1580591668.622:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4536 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x4, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100200}, {0x6}]}) 21:14:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000009000000", 0x1c) 21:14:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xd}}, {@max_batch_time={'max_batch_time'}}]}) [ 943.654392][ T4554] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4554 comm=syz-executor.2 [ 944.368585][ T22] audit: type=1326 audit(1580591669.432:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4536 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x5c, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x8, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100300}, {0x6}]}) 21:14:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000a000000", 0x1c) 21:14:29 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xe}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:29 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x4, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x36, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100400}, {0x6}]}) 21:14:29 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000b000000", 0x1c) 21:14:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0xb4, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100500}, {0x6}]}) 21:14:30 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x10}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100600}, {0x6}]}) 21:14:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2}, {0x6}]}) 21:14:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000c000000", 0x1c) 21:14:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x60, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100700}, {0x6}]}) 21:14:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3}, {0x6}]}) 21:14:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x61, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:30 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000d000000", 0x1c) 21:14:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x64, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4}, {0x6}]}) 21:14:30 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x11}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100800}, {0x6}]}) 21:14:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6c, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5}, {0x6}]}) 21:14:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000e000000", 0x1c) 21:14:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100900}, {0x6}]}) 21:14:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6}, {0x6}]}) 21:14:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100a00}, {0x6}]}) 21:14:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r5, 0x40045436, 0x34) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:31 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x12}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7}, {0x6}]}) 21:14:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000f000000", 0x1c) 21:14:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100b00}, {0x6}]}) 21:14:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xc}, {0x6}]}) 21:14:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x74, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100c00}, {0x6}]}) [ 946.399891][ T22] kauditd_printk_skb: 3 callbacks suppressed [ 946.399899][ T22] audit: type=1326 audit(1580591671.462:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4628 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 946.433038][ T4645] EXT4-fs: 12 callbacks suppressed [ 946.433046][ T4645] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000012,max_batch_time=0x0000000000000000, 21:14:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000010000000", 0x1c) 21:14:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x7c, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xf}, {0x6}]}) [ 946.493579][ T4654] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000012,max_batch_time=0x0000000000000000, [ 946.538568][ T4661] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4661 comm=syz-executor.2 21:14:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100d00}, {0x6}]}) [ 946.569862][ T22] audit: type=1326 audit(1580591671.632:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4662 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:32 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000024000000000000", 0x1c) 21:14:32 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x15}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000011000000", 0x1c) 21:14:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x14}, {0x6}]}) 21:14:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100e00}, {0x6}]}) 21:14:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x15}, {0x6}]}) 21:14:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x100f00}, {0x6}]}) 21:14:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x84, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000012000000", 0x1c) 21:14:32 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800001d000000000000", 0x1c) [ 947.352522][ T4672] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000015,max_batch_time=0x0000000000000000, [ 947.370458][ T22] audit: type=1326 audit(1580591672.432:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4662 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x16}, {0x6}]}) 21:14:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101000}, {0x6}]}) 21:14:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x17}, {0x6}]}) [ 947.463571][ T4686] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000015,max_batch_time=0x0000000000000000, 21:14:32 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x16}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:32 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2401000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101100}, {0x6}]}) 21:14:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000013000000", 0x1c) 21:14:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x18}, {0x6}]}) [ 947.493365][ T22] audit: type=1326 audit(1580591672.552:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4689 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x1c}, {0x6}]}) [ 947.597091][ T4705] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000016,max_batch_time=0x0000000000000000, [ 947.691293][ T4713] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000016,max_batch_time=0x0000000000000000, 21:14:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x87, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101200}, {0x6}]}) 21:14:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x1d}, {0x6}]}) 21:14:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000014000000", 0x1c) 21:14:33 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x22}}, {@max_batch_time={'max_batch_time'}}]}) [ 948.277803][ T22] audit: type=1326 audit(1580591673.342:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4689 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000015000000", 0x1c) 21:14:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x1e}, {0x6}]}) 21:14:33 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000f000000000000", 0x1c) 21:14:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101300}, {0x6}]}) 21:14:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x21}, {0x6}]}) [ 948.358215][ T22] audit: type=1326 audit(1580591673.422:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4717 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 948.384537][ T4722] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000022,max_batch_time=0x0000000000000000, 21:14:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x24}, {0x6}]}) 21:14:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101400}, {0x6}]}) [ 948.488588][ T4735] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000022,max_batch_time=0x0000000000000000, [ 949.164845][ T22] audit: type=1326 audit(1580591674.232:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4717 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x94, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000016000000", 0x1c) 21:14:34 executing program 2 (fault-call:19 fault-nth:0): r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x25}, {0x6}]}) 21:14:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101500}, {0x6}]}) 21:14:34 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x25}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x26}, {0x6}]}) 21:14:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x9c, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101600}, {0x6}]}) 21:14:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x27}, {0x6}]}) [ 949.277980][ T4752] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000025,max_batch_time=0x0000000000000000, [ 949.300282][ T4757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4757 comm=syz-executor.2 21:14:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000017000000", 0x1c) 21:14:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101700}, {0x6}]}) 21:14:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0xa4, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) [ 949.336047][ T4757] FAULT_INJECTION: forcing a failure. [ 949.336047][ T4757] name failslab, interval 1, probability 0, space 0, times 0 [ 949.340287][ T4762] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000025,max_batch_time=0x0000000000000000, [ 949.381593][ T4757] CPU: 0 PID: 4757 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01251-gf7eefc38b845 #0 [ 949.391683][ T4757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.401734][ T4757] Call Trace: [ 949.405025][ T4757] dump_stack+0x1b0/0x228 [ 949.409357][ T4757] ? devkmsg_release+0x127/0x127 [ 949.414298][ T4757] ? stack_trace_save+0x111/0x1e0 [ 949.419436][ T4757] ? show_regs_print_info+0x18/0x18 [ 949.424654][ T4757] ? __kasan_check_write+0x14/0x20 [ 949.429798][ T4757] should_fail+0x6fb/0x860 [ 949.434218][ T4757] ? setup_fault_attr+0x2b0/0x2b0 [ 949.439238][ T4757] ? _raw_spin_unlock_bh+0x19/0x20 [ 949.444372][ T4757] ? mld_del_delrec+0x6cf/0x750 [ 949.449240][ T4757] ? __x64_sys_open+0x87/0x90 [ 949.453932][ T4757] __should_failslab+0x11a/0x160 [ 949.458884][ T4757] ? ipv6_add_addr+0x41c/0x14b0 [ 949.463749][ T4757] should_failslab+0x9/0x20 [ 949.468256][ T4757] kmem_cache_alloc_trace+0x3a/0x2f0 [ 949.473551][ T4757] ? ipv6_add_addr+0x341/0x14b0 [ 949.478412][ T4757] ipv6_add_addr+0x41c/0x14b0 [ 949.483108][ T4757] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 949.488488][ T4757] ? ipv6_generate_stable_address+0x6b0/0x6b0 [ 949.494577][ T4757] ? __ipv6_addr_type+0x113/0x2f0 [ 949.500489][ T4757] inet6_addr_add+0x5a2/0x1300 [ 949.505250][ T4757] ? addrconf_add_ifaddr+0x310/0x310 [ 949.510536][ T4757] ? unwind_next_frame+0x415/0x870 [ 949.515646][ T4757] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 949.521644][ T4757] ? __kasan_check_write+0x14/0x20 [ 949.526760][ T4757] ? mutex_lock+0xa6/0x110 [ 949.531187][ T4757] ? mutex_trylock+0xb0/0xb0 [ 949.535888][ T4757] ? __kasan_check_write+0x14/0x20 [ 949.541002][ T4757] addrconf_add_ifaddr+0x208/0x310 [ 949.546114][ T4757] ? addrconf_set_dstaddr+0x530/0x530 [ 949.551488][ T4757] inet6_ioctl+0x106/0x150 [ 949.555897][ T4757] sock_do_ioctl+0xd6/0x300 [ 949.560402][ T4757] ? sock_splice_read+0xf0/0xf0 [ 949.565250][ T4757] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 949.571444][ T4757] ? get_pid_task+0x8d/0xa0 [ 949.575956][ T4757] ? proc_fail_nth_write+0x166/0x200 [ 949.581252][ T4757] ? __rcu_read_lock+0x50/0x50 [ 949.586369][ T4757] sock_ioctl+0x4cf/0x700 [ 949.590702][ T4757] ? sock_poll+0x310/0x310 [ 949.595167][ T4757] ? memset+0x31/0x40 [ 949.599185][ T4757] ? fsnotify+0x1390/0x1450 [ 949.603698][ T4757] ? __kernel_write+0x350/0x350 [ 949.608554][ T4757] ? sock_poll+0x310/0x310 [ 949.612978][ T4757] do_vfs_ioctl+0x747/0x1700 [ 949.617575][ T4757] ? selinux_file_ioctl+0x6e6/0x930 [ 949.622855][ T4757] ? ioctl_preallocate+0x240/0x240 [ 949.628063][ T4757] ? __fget+0x37c/0x3c0 [ 949.632220][ T4757] ? fget_many+0x30/0x30 [ 949.636475][ T4757] ? security_file_ioctl+0xae/0xd0 [ 949.641594][ T4757] __x64_sys_ioctl+0xe3/0x120 [ 949.646274][ T4757] do_syscall_64+0xc0/0x100 [ 949.650783][ T4757] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 949.656677][ T4757] RIP: 0033:0x45b399 [ 949.660569][ T4757] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:14:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x28}, {0x6}]}) [ 949.680283][ T4757] RSP: 002b:00007f4c67962c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.688706][ T4757] RAX: ffffffffffffffda RBX: 00007f4c679636d4 RCX: 000000000045b399 [ 949.696682][ T4757] RDX: 0000000020000000 RSI: 0000000000008916 RDI: 0000000000000009 [ 949.704660][ T4757] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 949.712635][ T4757] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 949.720610][ T4757] R13: 00000000000001fe R14: 00000000004c2d5a R15: 0000000000000000 [ 949.748258][ T22] audit: type=1326 audit(1580591674.812:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4767 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:35 executing program 2 (fault-call:19 fault-nth:1): r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2c}, {0x6}]}) 21:14:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101800}, {0x6}]}) 21:14:35 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000018000000", 0x1c) 21:14:35 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2e}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101900}, {0x6}]}) 21:14:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2d}, {0x6}]}) 21:14:35 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000019000000", 0x1c) 21:14:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2e}, {0x6}]}) 21:14:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101a00}, {0x6}]}) [ 950.195292][ T4794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4794 comm=syz-executor.2 [ 950.236462][ T4794] FAULT_INJECTION: forcing a failure. [ 950.236462][ T4794] name failslab, interval 1, probability 0, space 0, times 0 [ 950.258112][ T4794] CPU: 1 PID: 4794 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01251-gf7eefc38b845 #0 [ 950.268194][ T4794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.278337][ T4794] Call Trace: [ 950.281625][ T4794] dump_stack+0x1b0/0x228 [ 950.285949][ T4794] ? devkmsg_release+0x127/0x127 [ 950.291096][ T4794] ? show_regs_print_info+0x18/0x18 [ 950.296316][ T4794] ? stack_trace_save+0x1e0/0x1e0 [ 950.301338][ T4794] should_fail+0x6fb/0x860 [ 950.305822][ T4794] ? setup_fault_attr+0x2b0/0x2b0 [ 950.310937][ T4794] __should_failslab+0x11a/0x160 [ 950.315878][ T4794] ? kzalloc+0x26/0x40 [ 950.319938][ T4794] should_failslab+0x9/0x20 [ 950.324444][ T4794] __kmalloc+0x64/0x310 [ 950.328595][ T4794] ? __kernel_text_address+0x9a/0x110 [ 950.333957][ T4794] kzalloc+0x26/0x40 [ 950.337845][ T4794] fib6_info_alloc+0x2d/0xe0 [ 950.342442][ T4794] ip6_route_info_create+0x585/0x18e0 [ 950.347809][ T4794] ? __kasan_kmalloc+0x117/0x1b0 [ 950.352745][ T4794] ? kasan_kmalloc+0x9/0x10 [ 950.357240][ T4794] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 950.362693][ T4794] ? ipv6_add_addr+0x41c/0x14b0 [ 950.367548][ T4794] ? sock_do_ioctl+0xd6/0x300 [ 950.372221][ T4794] ? ip6_route_add+0x100/0x100 [ 950.376975][ T4794] ? _raw_spin_lock_bh+0xa4/0x180 [ 950.381993][ T4794] ? _raw_spin_lock_irq+0x180/0x180 [ 950.387183][ T4794] addrconf_f6i_alloc+0x310/0x530 [ 950.392198][ T4794] ? ip6_route_del+0x16b0/0x16b0 [ 950.397119][ T4794] ? should_fail+0x182/0x860 [ 950.401721][ T4794] ? __should_failslab+0x11a/0x160 [ 950.406829][ T4794] ? ipv6_add_addr+0x41c/0x14b0 [ 950.411660][ T4794] ? kasan_kmalloc+0x9/0x10 [ 950.416146][ T4794] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 950.421605][ T4794] ipv6_add_addr+0x46f/0x14b0 [ 950.426279][ T4794] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 950.431632][ T4794] ? ipv6_generate_stable_address+0x6b0/0x6b0 [ 950.437687][ T4794] ? __ipv6_addr_type+0x113/0x2f0 [ 950.442700][ T4794] inet6_addr_add+0x5a2/0x1300 [ 950.447452][ T4794] ? addrconf_add_ifaddr+0x310/0x310 [ 950.452725][ T4794] ? unwind_next_frame+0x415/0x870 [ 950.457823][ T4794] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 950.463787][ T4794] ? __kasan_check_write+0x14/0x20 [ 950.468887][ T4794] ? mutex_lock+0xa6/0x110 [ 950.473368][ T4794] ? mutex_trylock+0xb0/0xb0 [ 950.477953][ T4794] ? __kasan_check_write+0x14/0x20 [ 950.483074][ T4794] addrconf_add_ifaddr+0x208/0x310 [ 950.488177][ T4794] ? addrconf_set_dstaddr+0x530/0x530 [ 950.493543][ T4794] inet6_ioctl+0x106/0x150 [ 950.497949][ T4794] sock_do_ioctl+0xd6/0x300 [ 950.502452][ T4794] ? sock_splice_read+0xf0/0xf0 [ 950.507382][ T4794] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 950.513434][ T4794] ? get_pid_task+0x8d/0xa0 [ 950.517945][ T4794] ? proc_fail_nth_write+0x166/0x200 [ 950.523221][ T4794] ? __rcu_read_lock+0x50/0x50 [ 950.527960][ T4794] sock_ioctl+0x4cf/0x700 [ 950.532279][ T4794] ? sock_poll+0x310/0x310 [ 950.536689][ T4794] ? memset+0x31/0x40 [ 950.540660][ T4794] ? fsnotify+0x1390/0x1450 [ 950.545149][ T4794] ? __kernel_write+0x350/0x350 [ 950.550090][ T4794] ? sock_poll+0x310/0x310 [ 950.554504][ T4794] do_vfs_ioctl+0x747/0x1700 [ 950.559118][ T4794] ? selinux_file_ioctl+0x6e6/0x930 [ 950.564309][ T4794] ? ioctl_preallocate+0x240/0x240 [ 950.569419][ T4794] ? __fget+0x37c/0x3c0 [ 950.573589][ T4794] ? fget_many+0x30/0x30 [ 950.577827][ T4794] ? security_file_ioctl+0xae/0xd0 [ 950.582933][ T4794] __x64_sys_ioctl+0xe3/0x120 [ 950.587633][ T4794] do_syscall_64+0xc0/0x100 [ 950.592132][ T4794] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 950.598020][ T4794] RIP: 0033:0x45b399 [ 950.601987][ T4794] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.621696][ T4794] RSP: 002b:00007f4c67962c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.630102][ T4794] RAX: ffffffffffffffda RBX: 00007f4c679636d4 RCX: 000000000045b399 [ 950.638069][ T4794] RDX: 0000000020000000 RSI: 0000000000008916 RDI: 0000000000000009 [ 950.646036][ T4794] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 950.654071][ T4794] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 950.662032][ T4794] R13: 00000000000001fe R14: 00000000004c2d5a R15: 0000000000000001 21:14:35 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0xac, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:35 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x48}}, {@max_batch_time={'max_batch_time'}}]}) [ 950.671614][ T22] audit: type=1326 audit(1580591675.732:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4767 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 950.747499][ T22] audit: type=1326 audit(1580591675.812:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4806 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:36 executing program 2 (fault-call:19 fault-nth:2): r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2f}, {0x6}]}) 21:14:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000001a000000", 0x1c) 21:14:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x101b00}, {0x6}]}) 21:14:36 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4c}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x103000}, {0x6}]}) 21:14:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x30}, {0x6}]}) 21:14:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000001b000000", 0x1c) 21:14:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x34}, {0x6}]}) 21:14:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x105000}, {0x6}]}) [ 951.078307][ T4827] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4827 comm=syz-executor.2 21:14:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0xb1, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x35}, {0x6}]}) [ 951.551488][ T22] audit: type=1326 audit(1580591676.612:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4806 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:14:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000001c000000", 0x1c) 21:14:36 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x60}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:36 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x107000}, {0x6}]}) 21:14:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x36}, {0x6}]}) 21:14:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x2, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x37}, {0x6}]}) 21:14:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x109000}, {0x6}]}) 21:14:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3c}, {0x6}]}) 21:14:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x4, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:37 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000001d000000", 0x1c) [ 951.917530][ T4843] EXT4-fs: 6 callbacks suppressed [ 951.917540][ T4843] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000060,max_batch_time=0x0000000000000000, [ 951.994605][ T4860] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000060,max_batch_time=0x0000000000000000, [ 951.997239][ T4863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4863 comm=syz-executor.2 21:14:37 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x2, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:37 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x68}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x10b000}, {0x6}]}) 21:14:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3d}, {0x6}]}) 21:14:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x8, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:37 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000001e000000", 0x1c) 21:14:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3e}, {0x6}]}) 21:14:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x32, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x10d000}, {0x6}]}) 21:14:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x44}, {0x6}]}) 21:14:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0xa0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) [ 952.843060][ T4877] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000068,max_batch_time=0x0000000000000000, 21:14:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x10f000}, {0x6}]}) [ 952.912343][ T4890] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4890 comm=syz-executor.2 [ 952.980267][ T4896] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000068,max_batch_time=0x0000000000000000, [ 953.713572][ T4898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4898 comm=syz-executor.2 21:14:38 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x4b47, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:38 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000001f000000", 0x1c) 21:14:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x45}, {0x6}]}) 21:14:38 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x111000}, {0x6}]}) 21:14:38 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6c}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x113000}, {0x6}]}) 21:14:38 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x2, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x46}, {0x6}]}) 21:14:38 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000020000000", 0x1c) [ 953.829590][ T4908] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000000006c,max_batch_time=0x0000000000000000, 21:14:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x115000}, {0x6}]}) 21:14:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x47}, {0x6}]}) [ 953.881165][ T4919] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000000006c,max_batch_time=0x0000000000000000, [ 953.892283][ T4923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4923 comm=syz-executor.2 [ 954.713705][ T4930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4930 comm=syz-executor.2 21:14:39 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x4b49, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x117000}, {0x6}]}) 21:14:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x48}, {0x6}]}) 21:14:39 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x4, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:39 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x74}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:39 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000021000000", 0x1c) 21:14:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4c}, {0x6}]}) 21:14:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x119000}, {0x6}]}) 21:14:39 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000022000000", 0x1c) [ 954.825139][ T4939] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000074,max_batch_time=0x0000000000000000, 21:14:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4d}, {0x6}]}) 21:14:39 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x8, 0x7fffffff}, {0x5c}, {0x6}]}) [ 954.889542][ T4948] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000074,max_batch_time=0x0000000000000000, [ 954.902002][ T4950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4950 comm=syz-executor.2 21:14:40 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x7a}}, {@max_batch_time={'max_batch_time'}}]}) [ 954.976892][ T4960] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000000007a,max_batch_time=0x0000000000000000, [ 955.041806][ T4962] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000000007a,max_batch_time=0x0000000000000000, [ 955.696008][ T4964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4964 comm=syz-executor.2 21:14:40 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x541b, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:40 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000023000000", 0x1c) 21:14:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x11b000}, {0x6}]}) 21:14:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x32, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4e}, {0x6}]}) 21:14:40 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x124}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0xa0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4f}, {0x6}]}) 21:14:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x11d000}, {0x6}]}) 21:14:40 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000024000000", 0x1c) 21:14:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x50}, {0x6}]}) 21:14:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2}, {0x6}]}) [ 955.869387][ T4984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4984 comm=syz-executor.2 [ 956.668451][ T4994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4994 comm=syz-executor.2 21:14:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x5421, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x11f000}, {0x6}]}) 21:14:41 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3}, {0x6}]}) 21:14:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x54}, {0x6}]}) 21:14:41 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000025000000", 0x1c) 21:14:41 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x300}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x55}, {0x6}]}) 21:14:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x121000}, {0x6}]}) 21:14:41 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4}, {0x6}]}) 21:14:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x56}, {0x6}]}) 21:14:42 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000026000000", 0x1c) 21:14:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x123000}, {0x6}]}) [ 956.900342][ T5016] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5016 comm=syz-executor.2 [ 957.713936][ T5028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5028 comm=syz-executor.2 21:14:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x5450, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5}, {0x6}]}) 21:14:42 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x500}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x57}, {0x6}]}) 21:14:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x125000}, {0x6}]}) 21:14:42 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000027000000", 0x1c) 21:14:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x127000}, {0x6}]}) 21:14:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:14:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6}, {0x6}]}) [ 957.857744][ T5038] EXT4-fs: 4 callbacks suppressed [ 957.857755][ T5038] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000500,max_batch_time=0x0000000000000000, 21:14:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7}, {0x6}]}) 21:14:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5d}, {0x6}]}) 21:14:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x129000}, {0x6}]}) [ 957.920323][ T5050] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5050 comm=syz-executor.2 [ 957.983073][ T5055] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000500,max_batch_time=0x0000000000000000, [ 958.705169][ T5059] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5059 comm=syz-executor.2 21:14:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x5451, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:43 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000028000000", 0x1c) 21:14:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5e}, {0x6}]}) 21:14:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x12b000}, {0x6}]}) 21:14:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xc}, {0x6}]}) 21:14:43 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x600}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xf}, {0x6}]}) 21:14:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5f}, {0x6}]}) 21:14:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x12d000}, {0x6}]}) 21:14:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x14}, {0x6}]}) 21:14:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x60}, {0x6}]}) [ 958.838706][ T5069] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000600,max_batch_time=0x0000000000000000, 21:14:43 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000029000000", 0x1c) [ 958.929378][ T5085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5085 comm=syz-executor.2 [ 958.949525][ T5086] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000600,max_batch_time=0x0000000000000000, [ 959.729456][ T5090] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5090 comm=syz-executor.2 21:14:44 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x5452, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x15}, {0x6}]}) 21:14:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x12f000}, {0x6}]}) 21:14:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x61}, {0x6}]}) 21:14:44 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000002a000000", 0x1c) 21:14:44 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x700}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x16}, {0x6}]}) 21:14:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x131000}, {0x6}]}) 21:14:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x62}, {0x6}]}) [ 959.839385][ T5094] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000700,max_batch_time=0x0000000000000000, 21:14:45 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000002b000000", 0x1c) 21:14:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x17}, {0x6}]}) 21:14:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x63}, {0x6}]}) [ 959.892473][ T5105] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000700,max_batch_time=0x0000000000000000, [ 959.910739][ T5113] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5113 comm=syz-executor.2 21:14:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x5460, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:45 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x900}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x18}, {0x6}]}) 21:14:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x64}, {0x6}]}) 21:14:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x133000}, {0x6}]}) 21:14:45 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000002c000000", 0x1c) [ 960.698690][ T5120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5120 comm=syz-executor.2 21:14:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x65}, {0x6}]}) 21:14:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x1c}, {0x6}]}) 21:14:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x135000}, {0x6}]}) 21:14:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x66}, {0x6}]}) 21:14:45 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000002d000000", 0x1c) 21:14:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x1d}, {0x6}]}) [ 960.794789][ T5130] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000900,max_batch_time=0x0000000000000000, [ 960.820279][ T5143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5143 comm=syz-executor.2 [ 960.894683][ T5147] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000900,max_batch_time=0x0000000000000000, [ 961.636618][ T5145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5145 comm=syz-executor.2 21:14:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8901, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x137000}, {0x6}]}) 21:14:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x67}, {0x6}]}) 21:14:46 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x1e}, {0x6}]}) 21:14:46 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000002e000000", 0x1c) 21:14:46 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xa00}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x139000}, {0x6}]}) 21:14:46 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x21}, {0x6}]}) 21:14:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x69}, {0x6}]}) 21:14:46 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x24}, {0x6}]}) [ 961.786387][ T5159] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000a00,max_batch_time=0x0000000000000000, 21:14:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6a}, {0x6}]}) 21:14:46 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000002f000000", 0x1c) [ 961.859322][ T5174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5174 comm=syz-executor.2 [ 961.874040][ T5175] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000a00,max_batch_time=0x0000000000000000, 21:14:47 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8902, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x13b000}, {0x6}]}) 21:14:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6b}, {0x6}]}) 21:14:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x25}, {0x6}]}) 21:14:47 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000030000000", 0x1c) 21:14:47 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xb00}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x13d000}, {0x6}]}) 21:14:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6d}, {0x6}]}) 21:14:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x26}, {0x6}]}) 21:14:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6e}, {0x6}]}) 21:14:47 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000040000000", 0x1c) 21:14:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x13f000}, {0x6}]}) [ 962.830263][ T5203] selinux_nlmsg_perm: 1 callbacks suppressed [ 962.830273][ T5203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5203 comm=syz-executor.2 [ 962.864882][ T5204] EXT4-fs: 1 callbacks suppressed [ 962.864892][ T5204] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000b00,max_batch_time=0x0000000000000000, [ 963.619437][ T5215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5215 comm=syz-executor.2 21:14:48 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8903, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x27}, {0x6}]}) 21:14:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6f}, {0x6}]}) 21:14:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x141000}, {0x6}]}) 21:14:48 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xc00}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:48 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000ffffff9e000000", 0x1c) 21:14:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x143000}, {0x6}]}) 21:14:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x71}, {0x6}]}) 21:14:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x28}, {0x6}]}) 21:14:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x145000}, {0x6}]}) [ 963.757749][ T5224] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000c00,max_batch_time=0x0000000000000000, 21:14:48 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000caf000000", 0x1c) 21:14:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x72}, {0x6}]}) [ 963.819340][ T5236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5236 comm=syz-executor.2 [ 963.836882][ T5237] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000c00,max_batch_time=0x0000000000000000, [ 964.637254][ T5245] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5245 comm=syz-executor.2 21:14:49 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8904, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2c}, {0x6}]}) 21:14:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x147000}, {0x6}]}) 21:14:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x73}, {0x6}]}) 21:14:49 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000ec0000000", 0x1c) 21:14:49 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xd00}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x74}, {0x6}]}) 21:14:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2d}, {0x6}]}) 21:14:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x149000}, {0x6}]}) 21:14:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x75}, {0x6}]}) [ 964.767138][ T5256] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000d00,max_batch_time=0x0000000000000000, 21:14:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2e}, {0x6}]}) 21:14:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x14b000}, {0x6}]}) [ 964.825322][ T5267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5267 comm=syz-executor.2 [ 964.856337][ T5268] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000d00,max_batch_time=0x0000000000000000, [ 965.621161][ T5275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5275 comm=syz-executor.2 21:14:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8906, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:50 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000d2000000", 0x1c) 21:14:50 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x2f}, {0x6}]}) 21:14:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x76}, {0x6}]}) 21:14:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x14d000}, {0x6}]}) 21:14:50 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xe00}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x77}, {0x6}]}) 21:14:50 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x30}, {0x6}]}) 21:14:50 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000ffffffea000000", 0x1c) 21:14:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x14f000}, {0x6}]}) 21:14:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x79}, {0x6}]}) [ 965.740423][ T5284] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000e00,max_batch_time=0x0000000000000000, [ 965.778358][ T5294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5294 comm=syz-executor.2 21:14:50 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x34}, {0x6}]}) [ 965.843012][ T5302] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000e00,max_batch_time=0x0000000000000000, 21:14:51 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8907, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x151000}, {0x6}]}) 21:14:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7a}, {0x6}]}) 21:14:51 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000ffffffef000000", 0x1c) 21:14:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x35}, {0x6}]}) 21:14:51 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1100}}, {@max_batch_time={'max_batch_time'}}]}) [ 966.568731][ T5306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5306 comm=syz-executor.2 21:14:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x36}, {0x6}]}) 21:14:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x153000}, {0x6}]}) 21:14:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7b}, {0x6}]}) [ 966.643633][ T5317] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000001100,max_batch_time=0x0000000000000000, 21:14:51 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000fffffff0000000", 0x1c) 21:14:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x37}, {0x6}]}) 21:14:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7c}, {0x6}]}) [ 966.716918][ T5327] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000001100,max_batch_time=0x0000000000000000, [ 966.729896][ T5333] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5333 comm=syz-executor.2 [ 967.523670][ T5337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5337 comm=syz-executor.2 21:14:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3c}, {0x6}]}) 21:14:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x155000}, {0x6}]}) 21:14:52 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1200}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7d}, {0x6}]}) 21:14:52 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x890b, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:52 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000fffffffe000000", 0x1c) 21:14:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3d}, {0x6}]}) 21:14:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x157000}, {0x6}]}) 21:14:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7e}, {0x6}]}) 21:14:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3e}, {0x6}]}) [ 967.684252][ T5351] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000001200,max_batch_time=0x0000000000000000, 21:14:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x159000}, {0x6}]}) 21:14:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x84}, {0x6}]}) 21:14:52 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800009effffff000000", 0x1c) 21:14:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x15b000}, {0x6}]}) 21:14:52 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1500}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x87}, {0x6}]}) [ 967.895345][ T5378] EXT4-fs: 2 callbacks suppressed [ 967.895354][ T5378] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000001500,max_batch_time=0x0000000000000000, [ 968.507647][ T5380] selinux_nlmsg_perm: 1 callbacks suppressed [ 968.507658][ T5380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5380 comm=syz-executor.2 21:14:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x890c, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x44}, {0x6}]}) 21:14:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x94}, {0x6}]}) 21:14:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x15d000}, {0x6}]}) 21:14:53 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000eaffffff000000", 0x1c) 21:14:53 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1600}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x45}, {0x6}]}) 21:14:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x9c}, {0x6}]}) 21:14:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x15f000}, {0x6}]}) 21:14:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x46}, {0x6}]}) [ 968.656579][ T5391] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000001600,max_batch_time=0x0000000000000000, 21:14:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xa4}, {0x6}]}) 21:14:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x161000}, {0x6}]}) [ 968.702573][ T5401] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5401 comm=syz-executor.2 [ 968.764551][ T5408] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000001600,max_batch_time=0x0000000000000000, [ 969.499911][ T5407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5407 comm=syz-executor.2 21:14:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8918, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x47}, {0x6}]}) 21:14:54 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000efffffff000000", 0x1c) 21:14:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xac}, {0x6}]}) 21:14:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x163000}, {0x6}]}) 21:14:54 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1f00}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xb1}, {0x6}]}) 21:14:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x165000}, {0x6}]}) 21:14:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x48}, {0x6}]}) 21:14:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4c}, {0x6}]}) 21:14:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x167000}, {0x6}]}) [ 969.636186][ T5422] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000001f00,max_batch_time=0x0000000000000000, [ 969.712228][ T5436] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000001f00,max_batch_time=0x0000000000000000, [ 969.724435][ T5440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5440 comm=syz-executor.2 [ 970.530230][ T5442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5442 comm=syz-executor.2 21:14:55 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8936, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:55 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000f0ffffff000000", 0x1c) 21:14:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x169000}, {0x6}]}) 21:14:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x2}, {0x6}]}) 21:14:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4d}, {0x6}]}) 21:14:55 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2000}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x4}, {0x6}]}) 21:14:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4e}, {0x6}]}) 21:14:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x16b000}, {0x6}]}) 21:14:55 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000feffffff000000", 0x1c) [ 970.677002][ T5454] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000002000,max_batch_time=0x0000000000000000, 21:14:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x8}, {0x6}]}) [ 970.715674][ T5462] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5462 comm=syz-executor.2 21:14:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4f}, {0x6}]}) [ 970.752522][ T5466] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000002000,max_batch_time=0x0000000000000000, [ 971.508372][ T5474] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5474 comm=syz-executor.2 21:14:56 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8940, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x16d000}, {0x6}]}) 21:14:56 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x50}, {0x6}]}) 21:14:56 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000100", 0x1c) 21:14:56 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2200}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x36}, {0x6}]}) 21:14:56 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x54}, {0x6}]}) 21:14:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0xb4}, {0x6}]}) 21:14:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x16f000}, {0x6}]}) 21:14:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 971.642600][ T5481] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000002200,max_batch_time=0x0000000000000000, 21:14:56 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x55}, {0x6}]}) 21:14:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x171000}, {0x6}]}) [ 971.716325][ T5495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5495 comm=syz-executor.2 [ 971.741026][ T5497] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000002200,max_batch_time=0x0000000000000000, [ 972.487354][ T5505] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5505 comm=syz-executor.2 21:14:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x56}, {0x6}]}) 21:14:57 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000001", 0x1c) 21:14:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x2}, {0x6}]}) 21:14:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x173000}, {0x6}]}) 21:14:57 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8941, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:57 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2401}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x4}, {0x6}]}) 21:14:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x175000}, {0x6}]}) 21:14:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x57}, {0x6}]}) 21:14:57 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000340", 0x1c) [ 972.635398][ T5516] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000002401,max_batch_time=0x0000000000000000, 21:14:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x177000}, {0x6}]}) 21:14:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x8}, {0x6}]}) 21:14:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5d}, {0x6}]}) 21:14:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x36}, {0x6}]}) [ 972.710305][ T5527] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5527 comm=syz-executor.2 21:14:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x179000}, {0x6}]}) 21:14:57 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2500}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x894c, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x17b000}, {0x6}]}) 21:14:58 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:14:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0xb4}, {0x6}]}) 21:14:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5e}, {0x6}]}) 21:14:58 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2e00}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5f}, {0x6}]}) 21:14:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x17d000}, {0x6}]}) 21:14:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:14:58 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:14:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x60}, {0x6}]}) [ 973.621546][ T5562] EXT4-fs: 3 callbacks suppressed [ 973.621556][ T5562] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000002e00,max_batch_time=0x0000000000000000, 21:14:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x17f000}, {0x6}]}) [ 973.679571][ T5573] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000002e00,max_batch_time=0x0000000000000000, [ 973.695370][ T5577] selinux_nlmsg_perm: 1 callbacks suppressed [ 973.695380][ T5577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5577 comm=syz-executor.2 [ 974.514693][ T5583] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5583 comm=syz-executor.2 21:14:59 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8980, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:14:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x2}, {0x6}]}) 21:14:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x61}, {0x6}]}) 21:14:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:14:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x181000}, {0x6}]}) 21:14:59 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4000}}, {@max_batch_time={'max_batch_time'}}]}) 21:14:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x62}, {0x6}]}) 21:14:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x4}, {0x6}]}) 21:14:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x183000}, {0x6}]}) 21:14:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 974.646375][ T5595] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000004000,max_batch_time=0x0000000000000000, 21:14:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x8}, {0x6}]}) 21:14:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x63}, {0x6}]}) [ 974.736272][ T5610] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5610 comm=syz-executor.2 [ 974.750724][ T5608] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000004000,max_batch_time=0x0000000000000000, [ 975.530515][ T5618] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5618 comm=syz-executor.2 21:15:00 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8981, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x185000}, {0x6}]}) 21:15:00 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x64}, {0x6}]}) 21:15:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x10}, {0x6}]}) 21:15:00 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4800}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x65}, {0x6}]}) 21:15:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x36}, {0x6}]}) [ 975.654850][ T5626] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000004800,max_batch_time=0x0000000000000000, 21:15:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x187000}, {0x6}]}) 21:15:00 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x66}, {0x6}]}) 21:15:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x60}, {0x6}]}) [ 975.700318][ T5639] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5639 comm=syz-executor.2 [ 975.717448][ T5637] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000004800,max_batch_time=0x0000000000000000, [ 976.497187][ T5650] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5650 comm=syz-executor.2 21:15:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xa0}, {0x6}]}) 21:15:01 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4c00}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x67}, {0x6}]}) 21:15:01 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x189000}, {0x6}]}) 21:15:01 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8982, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x69}, {0x6}]}) 21:15:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xb4}, {0x6}]}) 21:15:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x18b000}, {0x6}]}) 21:15:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6a}, {0x6}]}) [ 976.638081][ T5661] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000004c00,max_batch_time=0x0000000000000000, 21:15:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xc0}, {0x6}]}) 21:15:01 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x18d000}, {0x6}]}) [ 976.696333][ T5674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5674 comm=syz-executor.2 [ 976.714715][ T5675] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000004c00,max_batch_time=0x0000000000000000, 21:15:01 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6b}, {0x6}]}) 21:15:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xe0}, {0x6}]}) 21:15:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 976.821588][ T5691] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000006000,max_batch_time=0x0000000000000000, [ 976.899915][ T5696] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000006000,max_batch_time=0x0000000000000000, [ 977.470453][ T5698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5698 comm=syz-executor.2 21:15:02 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8983, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x18f000}, {0x6}]}) 21:15:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x23e}, {0x6}]}) 21:15:02 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6d}, {0x6}]}) 21:15:02 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6800}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x348}, {0x6}]}) 21:15:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6e}, {0x6}]}) 21:15:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x191000}, {0x6}]}) 21:15:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x382}, {0x6}]}) 21:15:02 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6f}, {0x6}]}) [ 977.671366][ T5723] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5723 comm=syz-executor.2 [ 978.460546][ T5730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5730 comm=syz-executor.2 21:15:03 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x89a0, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x2000}, {0x6}]}) 21:15:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x193000}, {0x6}]}) 21:15:03 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6c00}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x71}, {0x6}]}) 21:15:03 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x72}, {0x6}]}) 21:15:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x3600}, {0x6}]}) 21:15:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x195000}, {0x6}]}) 21:15:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x73}, {0x6}]}) 21:15:03 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x3e02}, {0x6}]}) [ 978.643719][ T5750] EXT4-fs: 3 callbacks suppressed [ 978.643728][ T5750] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000006c00,max_batch_time=0x0000000000000000, [ 979.463532][ T5763] selinux_nlmsg_perm: 1 callbacks suppressed [ 979.463543][ T5763] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5763 comm=syz-executor.2 21:15:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x89a1, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x197000}, {0x6}]}) 21:15:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x4000}, {0x6}]}) 21:15:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x74}, {0x6}]}) 21:15:04 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x7400}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:04 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x75}, {0x6}]}) 21:15:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x198b97}, {0x6}]}) 21:15:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x4803}, {0x6}]}) [ 979.631264][ T5773] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000007400,max_batch_time=0x0000000000000000, 21:15:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x199000}, {0x6}]}) 21:15:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x76}, {0x6}]}) 21:15:04 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 979.707319][ T5785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5785 comm=syz-executor.2 [ 979.728491][ T5782] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000007400,max_batch_time=0x0000000000000000, [ 980.523723][ T5797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5797 comm=syz-executor.2 21:15:05 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x40049409, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x6000}, {0x6}]}) 21:15:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x77}, {0x6}]}) 21:15:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x19b000}, {0x6}]}) 21:15:05 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:05 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x7a00}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x79}, {0x6}]}) 21:15:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x8203}, {0x6}]}) 21:15:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x19d000}, {0x6}]}) 21:15:05 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 980.684947][ T5809] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000007a00,max_batch_time=0x0000000000000000, [ 980.711672][ T5815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5815 comm=syz-executor.2 21:15:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x9fff}, {0x6}]}) 21:15:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7a}, {0x6}]}) [ 980.753928][ T5819] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000007a00,max_batch_time=0x0000000000000000, [ 981.555006][ T5830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5830 comm=syz-executor.2 21:15:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7b}, {0x6}]}) 21:15:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xa000}, {0x6}]}) 21:15:06 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:06 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x20000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:06 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x40086602, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x19f000}, {0x6}]}) 21:15:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7c}, {0x6}]}) 21:15:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x19fb87}, {0x6}]}) 21:15:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xb400}, {0x6}]}) 21:15:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7d}, {0x6}]}) [ 981.702743][ T5841] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000020000,max_batch_time=0x0000000000000000, 21:15:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1a1000}, {0x6}]}) 21:15:06 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xc000}, {0x6}]}) [ 981.763772][ T5851] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000020000,max_batch_time=0x0000000000000000, [ 981.775519][ T5854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5854 comm=syz-executor.2 21:15:06 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x40000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x7e}, {0x6}]}) 21:15:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1a3000}, {0x6}]}) [ 981.878351][ T5863] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000040000,max_batch_time=0x0000000000000000, [ 981.961470][ T5870] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000040000,max_batch_time=0x0000000000000000, [ 982.564629][ T5872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5872 comm=syz-executor.2 21:15:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x40087602, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xe000}, {0x6}]}) 21:15:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x84}, {0x6}]}) 21:15:07 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1a5000}, {0x6}]}) 21:15:07 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x80000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xff9f}, {0x6}]}) 21:15:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1a7000}, {0x6}]}) 21:15:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x87}, {0x6}]}) 21:15:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1a9000}, {0x6}]}) 21:15:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x100000}, {0x6}]}) 21:15:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x94}, {0x6}]}) [ 982.694597][ T5880] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000080000,max_batch_time=0x0000000000000000, [ 982.725313][ T5892] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5892 comm=syz-executor.2 [ 983.532022][ T5902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5902 comm=syz-executor.2 21:15:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x9c}, {0x6}]}) 21:15:08 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x1a46f9}, {0x6}]}) 21:15:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1ab000}, {0x6}]}) 21:15:08 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x80040}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:08 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x4020940d, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x1c804e}, {0x6}]}) 21:15:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xa4}, {0x6}]}) 21:15:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1ad000}, {0x6}]}) 21:15:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x200000}, {0x6}]}) [ 983.665823][ T5911] EXT4-fs: 1 callbacks suppressed [ 983.665831][ T5911] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000080040,max_batch_time=0x0000000000000000, 21:15:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xac}, {0x6}]}) 21:15:08 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x400000}, {0x6}]}) [ 983.728254][ T5924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5924 comm=syz-executor.2 [ 983.753734][ T5927] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000080040,max_batch_time=0x0000000000000000, [ 984.523548][ T5935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5935 comm=syz-executor.2 21:15:09 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x80086601, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1af000}, {0x6}]}) 21:15:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0xb1}, {0x6}]}) 21:15:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x600000}, {0x6}]}) 21:15:09 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:09 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x3ff7f8}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x800000}, {0x6}]}) 21:15:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1b1000}, {0x6}]}) 21:15:09 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x2}, {0x6}]}) 21:15:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xa00000}, {0x6}]}) [ 984.654366][ T5945] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x00000000003ff7f8,max_batch_time=0x0000000000000000, [ 984.714398][ T5955] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x00000000003ff7f8,max_batch_time=0x0000000000000000, [ 984.726124][ T5957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5957 comm=syz-executor.2 [ 985.533966][ T5966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5966 comm=syz-executor.2 21:15:10 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x80087601, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x4}, {0x6}]}) 21:15:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1b3000}, {0x6}]}) 21:15:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xc00000}, {0x6}]}) 21:15:10 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x3ff800}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:10 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1b5000}, {0x6}]}) 21:15:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xe00000}, {0x6}]}) 21:15:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x8}, {0x6}]}) 21:15:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1b7000}, {0x6}]}) [ 985.678677][ T5977] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x00000000003ff800,max_batch_time=0x0000000000000000, 21:15:10 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x1000000}, {0x6}]}) [ 985.725248][ T5984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5984 comm=syz-executor.2 [ 985.766867][ T5989] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x00000000003ff800,max_batch_time=0x0000000000000000, [ 986.533530][ T5996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5996 comm=syz-executor.2 21:15:11 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x80108906, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x32}, {0x6}]}) 21:15:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1b9000}, {0x6}]}) 21:15:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x2000000}, {0x6}]}) 21:15:11 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:11 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x400000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x4000000}, {0x6}]}) 21:15:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1bb000}, {0x6}]}) 21:15:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0xa0}, {0x6}]}) [ 986.672433][ T6003] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000400000,max_batch_time=0x0000000000000000, 21:15:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x8000000}, {0x6}]}) 21:15:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:11 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 986.716408][ T6017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6017 comm=syz-executor.2 [ 986.734598][ T6020] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000400000,max_batch_time=0x0000000000000000, [ 987.519713][ T6028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6028 comm=syz-executor.2 21:15:12 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x80108907, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x36000000}, {0x6}]}) 21:15:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1bd000}, {0x6}]}) 21:15:12 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xf83f00}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x2}, {0x6}]}) 21:15:12 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x4}, {0x6}]}) 21:15:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x3e020000}, {0x6}]}) 21:15:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1bf000}, {0x6}]}) 21:15:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x8}, {0x6}]}) 21:15:12 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 987.669142][ T6038] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000f83f00,max_batch_time=0x0000000000000000, 21:15:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x40000000}, {0x6}]}) [ 987.727469][ T6050] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6050 comm=syz-executor.2 [ 987.747177][ T6051] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000f83f00,max_batch_time=0x0000000000000000, [ 988.523744][ T6059] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6059 comm=syz-executor.2 21:15:13 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200000}, {0x6}]}) 21:15:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x32}, {0x6}]}) 21:15:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x48030000}, {0x6}]}) 21:15:13 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0xc0045878, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:13 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x4e801c00}, {0x6}]}) 21:15:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0xa0}, {0x6}]}) 21:15:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200100}, {0x6}]}) 21:15:13 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x5ffe5fff}, {0x6}]}) 21:15:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200200}, {0x6}]}) [ 988.732262][ T6079] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6079 comm=syz-executor.2 [ 988.765451][ T6082] EXT4-fs: 1 callbacks suppressed [ 988.765460][ T6082] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000001000000,max_batch_time=0x0000000000000000, 21:15:13 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x82030000}, {0x6}]}) 21:15:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200300}, {0x6}]}) [ 988.878663][ T6097] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000002000000,max_batch_time=0x0000000000000000, [ 988.941356][ T6100] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000002000000,max_batch_time=0x0000000000000000, 21:15:14 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x2}, {0x6}]}) 21:15:14 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0xc0045878, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:14 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x3000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xb4000000}, {0x6}]}) 21:15:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200400}, {0x6}]}) 21:15:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x4}, {0x6}]}) 21:15:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xf9461a00}, {0x6}]}) 21:15:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200500}, {0x6}]}) 21:15:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xff5ffe5f}, {0x6}]}) [ 989.689847][ T6111] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000003000000,max_batch_time=0x0000000000000000, 21:15:14 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x8}, {0x6}]}) 21:15:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200600}, {0x6}]}) [ 989.734300][ T6123] selinux_nlmsg_perm: 1 callbacks suppressed [ 989.734310][ T6123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6123 comm=syz-executor.2 [ 989.770789][ T6125] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000003000000,max_batch_time=0x0000000000000000, [ 990.530632][ T6135] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6135 comm=syz-executor.2 21:15:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0xff9f0000}, {0x6}]}) 21:15:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x10}, {0x6}]}) 21:15:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200700}, {0x6}]}) 21:15:15 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:15 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:15 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0xc0189436, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x2}]}) 21:15:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x32}, {0x6}]}) 21:15:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x200800}, {0x6}]}) 21:15:15 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x3}]}) [ 990.665043][ T6142] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000004000000,max_batch_time=0x0000000000000000, 21:15:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x60}, {0x6}]}) [ 990.737323][ T6156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6156 comm=syz-executor.2 [ 990.757283][ T6157] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000004000000,max_batch_time=0x0000000000000000, [ 991.519732][ T6164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6164 comm=syz-executor.2 21:15:16 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0xc020660b, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0xa0}, {0x6}]}) 21:15:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300000}, {0x6}]}) 21:15:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x4}]}) 21:15:16 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:16 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x5000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x5}]}) 21:15:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300100}, {0x6}]}) 21:15:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x23e}, {0x6}]}) 21:15:16 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x7}]}) 21:15:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300200}, {0x6}]}) [ 991.667417][ T6177] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000005000000,max_batch_time=0x0000000000000000, [ 991.694299][ T6183] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6183 comm=syz-executor.2 [ 991.783117][ T6192] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000005000000,max_batch_time=0x0000000000000000, [ 992.493551][ T6196] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6196 comm=syz-executor.2 21:15:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r9, 0x5201) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x35c}, {0x6}]}) 21:15:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0xc}]}) 21:15:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300300}, {0x6}]}) 21:15:17 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:17 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x382}, {0x6}]}) 21:15:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300400}, {0x6}]}) 21:15:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x14}]}) 21:15:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x2000}, {0x6}]}) 21:15:17 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 992.699974][ T6206] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000006000000,max_batch_time=0x0000000000000000, 21:15:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300500}, {0x6}]}) [ 992.768280][ T6219] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6219 comm=syz-executor.2 [ 993.563534][ T6228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6228 comm=syz-executor.2 21:15:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x3200}, {0x6}]}) 21:15:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x15}]}) 21:15:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300600}, {0x6}]}) 21:15:18 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x7000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:18 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x1, 0xa, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$SIOCSIFMTU(r7, 0x8922, &(0x7f0000000100)={'veth1_to_bond\x00', 0x800}) vmsplice(r6, &(0x7f0000000540)=[{&(0x7f00000005c0)="cfced024d56106083286bd1c6a68ce88f071a019192b3223c93a004b2b642b5e3b0e9e81c6b0820ec2ab1641c7100675b5bfe30304c6f44f3c465e5d67df41253047afb361bea29f367c21a5e117b9c87a48057a822e82097facf07aee22de5b76ee8bfc74d0fe54355ef388e0f2bcd57aa76411008ca9afabaec9d03869ec10a155d38bba7354", 0x87}, {&(0x7f0000000680)="68f17d422c3122c66de35f2e3615a4a07ce2620ae78d0326977db70e98cc2c333c3897f351363cc9e92755b0f00acd4dce7b6e93b1016abcaedd27155d9004238ababae5927b272955ed0b18fed160c5d4445cbba8f3eb16f84290b5b4c55440f1fd22e603c88b1c299ac7ece34221b37b97753d10117411d3453e756281d8cdb52c154781b60744893dfc462580c40999d2cc9c8aa9a9311e20968dce2a4b980f3327b53460e22c3db43d90cbecb23d29d8bd45e27f406aec60f2b25703b99f4feb70c293c28c82a8aaf2ba4c5b319027b8bcabfabe2b7ef4f334f490cba8206c6131ff76ccd993241ba25ce0e831fa99def539cc", 0xf5}, {&(0x7f0000000780)="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", 0xfb}], 0x3, 0x8) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r6, 0x0, r9, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x16}]}) 21:15:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x3e02}, {0x6}]}) 21:15:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300700}, {0x6}]}) 21:15:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x1c}]}) 21:15:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300800}, {0x6}]}) 21:15:18 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x4000}, {0x6}]}) 21:15:18 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x8000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x1d}]}) [ 993.755449][ T6252] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6252 comm=syz-executor.2 21:15:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x5c03}, {0x6}]}) 21:15:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300900}, {0x6}]}) [ 993.828364][ T6264] EXT4-fs: 3 callbacks suppressed [ 993.828371][ T6264] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000008000000,max_batch_time=0x0000000000000000, [ 993.915410][ T6271] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000008000000,max_batch_time=0x0000000000000000, [ 994.516353][ T6258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6258 comm=syz-executor.2 21:15:19 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x21}]}) 21:15:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x6000}, {0x6}]}) 21:15:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300a00}, {0x6}]}) 21:15:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x81, 0x4, 0x100000001, 0x67, 0x7, 0x101a}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:19 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x9000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x24}]}) 21:15:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x8203}, {0x6}]}) 21:15:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300b00}, {0x6}]}) 21:15:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x25}]}) 21:15:19 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 994.693492][ T6283] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000009000000,max_batch_time=0x0000000000000000, 21:15:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x9fff}, {0x6}]}) 21:15:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x28}]}) 21:15:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300c00}, {0x6}]}) [ 994.763364][ T6295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6295 comm=syz-executor.2 21:15:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0xa000}, {0x6}]}) 21:15:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x2c}]}) [ 994.810028][ T6301] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000009000000,max_batch_time=0x0000000000000000, [ 995.619330][ T6295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6295 comm=syz-executor.2 21:15:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x2, &(0x7f0000000100)=[{}, {}]}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x258) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0xff9f}, {0x6}]}) 21:15:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x2d}]}) 21:15:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300d00}, {0x6}]}) 21:15:20 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xa000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:20 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x30}]}) 21:15:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300e00}, {0x6}]}) 21:15:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x100000}, {0x6}]}) 21:15:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x34}]}) [ 995.803473][ T6323] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000a000000,max_batch_time=0x0000000000000000, 21:15:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x300f00}, {0x6}]}) 21:15:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x1a7ba8}, {0x6}]}) [ 995.844306][ T6332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6332 comm=syz-executor.2 [ 995.891320][ T6336] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000a000000,max_batch_time=0x0000000000000000, [ 996.640879][ T6344] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6344 comm=syz-executor.2 21:15:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x35}]}) 21:15:21 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301000}, {0x6}]}) 21:15:21 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xb000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x1d7d76}, {0x6}]}) 21:15:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x3c}]}) 21:15:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fgetxattr(r7, &(0x7f0000000300)=@random={'security.', 'bridge0\x00'}, &(0x7f0000000400)=""/39, 0x27) close(r6) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xffc1) r9 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r9, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x60, r10, 0x400, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0xc1}, 0x44) sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x34, r10, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x662}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x34}, 0x1, 0x0, 0x0, 0x8010}, 0x11) splice(r5, 0x0, r6, 0x0, 0x550, 0x0) ioctl$TIOCSIG(r5, 0x40045436, 0x34) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r11, 0x4000000000000, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000b0c82e5dadd880a6c9f60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x260) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x200000}, {0x6}]}) 21:15:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301100}, {0x6}]}) 21:15:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x3d}]}) 21:15:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x600000}, {0x6}]}) 21:15:21 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301200}, {0x6}]}) [ 996.802170][ T6355] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000b000000,max_batch_time=0x0000000000000000, 21:15:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x800000}, {0x6}]}) 21:15:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x44}]}) [ 996.861242][ T6366] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000b000000,max_batch_time=0x0000000000000000, [ 996.884371][ T6370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6370 comm=syz-executor.2 21:15:22 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xc000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301300}, {0x6}]}) 21:15:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x45}]}) [ 997.023750][ T6386] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000c000000,max_batch_time=0x0000000000000000, [ 997.069150][ T6388] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000000c000000,max_batch_time=0x0000000000000000, [ 997.675343][ T6390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6390 comm=syz-executor.2 21:15:22 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x1000000}, {0x6}]}) 21:15:22 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x48}]}) 21:15:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301400}, {0x6}]}) 21:15:22 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xd000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x4c}]}) 21:15:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x2000000}, {0x6}]}) 21:15:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301500}, {0x6}]}) 21:15:22 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x4d}]}) 21:15:22 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xe000000}}, {@max_batch_time={'max_batch_time'}}]}) [ 997.913314][ T6419] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6419 comm=syz-executor.2 21:15:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r7, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x4000000}, {0x6}]}) 21:15:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301600}, {0x6}]}) 21:15:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x50}]}) 21:15:23 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:23 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x10000000}}, {@max_batch_time={'max_batch_time'}}]}) [ 998.703534][ T6426] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6426 comm=syz-executor.2 21:15:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x8000000}, {0x6}]}) 21:15:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x54}]}) 21:15:23 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffff", 0x1c) 21:15:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301700}, {0x6}]}) 21:15:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x5c}]}) [ 998.868931][ T6445] EXT4-fs: 5 callbacks suppressed [ 998.868940][ T6445] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000010000000,max_batch_time=0x0000000000000000, 21:15:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x32000000}, {0x6}]}) [ 998.909349][ T6449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6449 comm=syz-executor.2 [ 999.713547][ T6458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6458 comm=syz-executor.2 21:15:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301800}, {0x6}]}) 21:15:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x60}]}) 21:15:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x3e020000}, {0x6}]}) 21:15:24 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000000000c", 0x1c) 21:15:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f0000001240)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0x98, 0x0, 0x0, 0x0, 0x98, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x2, 0x4], 0xfd}, {0x0, [0x1]}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x207) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:24 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x11000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301900}, {0x6}]}) 21:15:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x61}]}) 21:15:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x40000000}, {0x6}]}) [ 999.854901][ T6468] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000011000000,max_batch_time=0x0000000000000000, 21:15:24 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000000000e", 0x1c) 21:15:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x64}]}) 21:15:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301a00}, {0x6}]}) 21:15:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x5c030000}, {0x6}]}) [ 999.931326][ T6480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6480 comm=syz-executor.2 [ 999.960996][ T6481] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000011000000,max_batch_time=0x0000000000000000, 21:15:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6c}]}) 21:15:25 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:15:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x301b00}, {0x6}]}) [ 1000.715269][ T6498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6498 comm=syz-executor.2 21:15:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x5fff5fff}, {0x6}]}) 21:15:25 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x12000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x74}]}) 21:15:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400000}, {0x6}]}) 21:15:25 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffff", 0x1c) 21:15:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x7c}]}) 21:15:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400100}, {0x6}]}) 21:15:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x767d1d00}, {0x6}]}) 21:15:25 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffff", 0x1c) 21:15:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x84}]}) [ 1000.858563][ T6505] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000012000000,max_batch_time=0x0000000000000000, 21:15:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x82030000}, {0x6}]}) [ 1000.922359][ T6520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6520 comm=syz-executor.2 [ 1000.938086][ T6517] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000012000000,max_batch_time=0x0000000000000000, [ 1001.754266][ T6520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6520 comm=syz-executor.2 21:15:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x87}]}) 21:15:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400200}, {0x6}]}) 21:15:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffff", 0x1c) 21:15:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0xa0000000}, {0x6}]}) 21:15:26 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x15000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400300}, {0x6}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0xa87b1a00}, {0x6}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x94}]}) 21:15:27 executing program 2: r0 = socket(0x2c, 0x1, 0x9) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) write$binfmt_misc(r2, &(0x7f0000000600)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYRES64, @ANYRES16=0x0, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRESDEC=r1, @ANYRES64=r6, @ANYRES16, @ANYBLOB="4240b1f29217e818e25243715e3d8a08500dc2c552dc29a32c98d6749ca42cb9aed50e9b08298fd472f4935e983b47dee9f9832f2e6efbc24bf0422162cf1d08b392a7bd82cc5dce06007027ee991a81a8696c0c302ad203f1134b15d21d2255f2578400289d0b", @ANYRESHEX=r1, @ANYPTR]], @ANYRES32=r4, @ANYRESDEC, @ANYPTR64=&(0x7f0000000980)=ANY=[@ANYBLOB="0aa544d24b304f3ff9ae14b1ee55ca567f3bf8399b55bf4f4f0cd9681bf5804a17d1f5cf", @ANYBLOB="7e91bc7fe5943c047fea4c90660828cc87fea1015aa6e913df949a57aaacd4b4", @ANYRESOCT, @ANYRESOCT=r1]]], 0x8) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000580)={0x3c, &(0x7f00000000c0)}) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r8 = socket(0x100000000011, 0x2, 0x0) bind(r8, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, 0x0, 0x0) getsockname$netlink(r9, &(0x7f00000001c0), &(0x7f00000005c0)=0xc) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r10}) socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0x400, 0x0) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r11, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0xffffffffffffff79, r12, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000890) socket$inet_udp(0x2, 0x2, 0x0) 21:15:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffff", 0x1c) [ 1001.914207][ T6535] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000015000000,max_batch_time=0x0000000000000000, 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400400}, {0x6}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0xff5fff5f}, {0x6}]}) [ 1001.979000][ T6549] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000015000000,max_batch_time=0x0000000000000000, 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x9c}]}) 21:15:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x16000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400500}, {0x6}]}) 21:15:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000020000000000", 0x1c) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0xff9f0000}, {0x6}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0xa4}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400600}, {0x6}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x2}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0xac}]}) [ 1002.120454][ T6570] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000016000000,max_batch_time=0x0000000000000000, 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400700}, {0x6}]}) 21:15:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000030000000000", 0x1c) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x3}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0xb1}]}) [ 1002.198533][ T6581] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000016000000,max_batch_time=0x0000000000000000, 21:15:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1f000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400800}, {0x6}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x4}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x2}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500000}, {0x6}]}) 21:15:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000040000000000", 0x1c) [ 1002.316424][ T6595] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000001f000000,max_batch_time=0x0000000000000000, 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x5}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500100}, {0x6}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x4}]}) 21:15:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x20000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x7}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500200}, {0x6}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0xc}]}) 21:15:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000050000000000", 0x1c) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x8}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500300}, {0x6}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x14}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x36}]}) 21:15:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000060000000000", 0x1c) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500400}, {0x6}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0xb4}]}) 21:15:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x22000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x15}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500500}, {0x6}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x16}]}) 21:15:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000070000000000", 0x1c) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x2}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500600}, {0x6}]}) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x4}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x1c}]}) 21:15:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x24010000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x1d}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500700}, {0x6}]}) 21:15:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000080000000000", 0x1c) 21:15:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x8}]}) 21:15:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x21}]}) 21:15:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500800}, {0x6}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x36}]}) 21:15:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x25000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x24}]}) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500900}, {0x6}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0xb4}]}) 21:15:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000090000000000", 0x1c) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x25}]}) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500a00}, {0x6}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x28}]}) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500b00}, {0x6}]}) 21:15:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2e000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x2}]}) 21:15:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000a0000000000", 0x1c) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x2c}]}) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500c00}, {0x6}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x4}]}) 21:15:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000b0000000000", 0x1c) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x2d}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x8}]}) 21:15:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x40000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500d00}, {0x6}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x10}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x30}]}) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500e00}, {0x6}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x36}]}) 21:15:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000c0000000000", 0x1c) 21:15:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x40000800}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500f00}, {0x6}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x34}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x60}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x35}]}) 21:15:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000d0000000000", 0x1c) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501000}, {0x6}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xa0}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x3c}]}) 21:15:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x48000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xb4}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x3d}]}) 21:15:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000e0000000000", 0x1c) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501100}, {0x6}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xc0}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x44}]}) 21:15:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4c000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x45}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xe0}]}) 21:15:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000f0000000000", 0x1c) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501200}, {0x6}]}) 21:15:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x48}]}) 21:15:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x23e}]}) 21:15:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501300}, {0x6}]}) 21:15:28 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000100000000000", 0x1c) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x4c}]}) [ 1003.885468][ T6797] EXT4-fs: 18 callbacks suppressed [ 1003.885477][ T6797] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000004c000000,max_batch_time=0x0000000000000000, 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x348}]}) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x4d}]}) 21:15:29 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x60000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501400}, {0x6}]}) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x50}]}) 21:15:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000110000000000", 0x1c) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x382}]}) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x2000}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501500}, {0x6}]}) [ 1004.061948][ T6814] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000060000000,max_batch_time=0x0000000000000000, 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x54}]}) 21:15:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000120000000000", 0x1c) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x3600}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501600}, {0x6}]}) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x5c}]}) [ 1004.183275][ T6827] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000060000000,max_batch_time=0x0000000000000000, 21:15:29 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x68000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501700}, {0x6}]}) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x3e02}]}) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x60}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501800}, {0x6}]}) 21:15:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000130000000000", 0x1c) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x4000}]}) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x61}]}) [ 1004.355216][ T6841] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000068000000,max_batch_time=0x0000000000000000, 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501900}, {0x6}]}) 21:15:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000140000000000", 0x1c) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x4803}]}) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x64}]}) [ 1004.444640][ T6854] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000068000000,max_batch_time=0x0000000000000000, 21:15:29 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6c000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501a00}, {0x6}]}) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x6000}]}) 21:15:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000150000000000", 0x1c) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6c}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x501b00}, {0x6}]}) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x8203}]}) [ 1004.599244][ T6870] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000006c000000,max_batch_time=0x0000000000000000, 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x74}]}) 21:15:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000160000000000", 0x1c) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600000}, {0x6}]}) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x9fff}]}) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x7c}]}) [ 1004.704167][ T6881] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000006c000000,max_batch_time=0x0000000000000000, 21:15:29 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x74000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xa000}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600100}, {0x6}]}) 21:15:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000170000000000", 0x1c) 21:15:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x84}]}) 21:15:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600200}, {0x6}]}) 21:15:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xb400}]}) [ 1004.862286][ T6898] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000074000000,max_batch_time=0x0000000000000000, 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x87}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xc000}]}) 21:15:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000180000000000", 0x1c) [ 1004.934283][ T6907] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000074000000,max_batch_time=0x0000000000000000, 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xe000}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600300}, {0x6}]}) 21:15:30 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x7a000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xff9f}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600400}, {0x6}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x94}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x100000}]}) [ 1005.106169][ T6922] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x000000007a000000,max_batch_time=0x0000000000000000, 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600500}, {0x6}]}) 21:15:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000190000000000", 0x1c) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x9c}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x1a46f9}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0xa4}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600600}, {0x6}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x1c804e}]}) 21:15:30 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x8cffffff}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001a0000000000", 0x1c) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0xac}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x200000}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600700}, {0x6}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0xb1}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x400000}]}) 21:15:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001b0000000000", 0x1c) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x600800}, {0x6}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x600000}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700000}, {0x6}]}) 21:15:30 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xf6ffffff}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x2}]}) 21:15:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001c0000000000", 0x1c) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x800000}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700100}, {0x6}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xa00000}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x4}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700200}, {0x6}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xc00000}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x8}]}) 21:15:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001d0000000000", 0x1c) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700300}, {0x6}]}) 21:15:30 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xf8f73f00}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xe00000}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x32}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700400}, {0x6}]}) 21:15:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000001e0000000000", 0x1c) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0xa0}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x1000000}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700500}, {0x6}]}) 21:15:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x2000000}]}) 21:15:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x2}]}) 21:15:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000210000000000", 0x1c) 21:15:31 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xfdfdffff}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x4000000}]}) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700600}, {0x6}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x4}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x8}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x8000000}]}) 21:15:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000220000000000", 0x1c) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x32}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x36000000}]}) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700700}, {0x6}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x3e020000}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0xa0}]}) 21:15:31 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xffefffff}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700800}, {0x6}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x40000000}]}) 21:15:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000230000000000", 0x1c) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700900}, {0x6}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x48030000}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x4e801c00}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x2}]}) 21:15:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000240000000000", 0x1c) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700a00}, {0x6}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x5ffe5fff}]}) 21:15:31 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xffffefff}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x4}]}) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700b00}, {0x6}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x82030000}]}) 21:15:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000250000000000", 0x1c) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700c00}, {0x6}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xb4000000}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x8}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xf9461a00}]}) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700d00}, {0x6}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x10}]}) 21:15:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000260000000000", 0x1c) 21:15:31 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xfffffdfd}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xff5ffe5f}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x32}]}) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700e00}, {0x6}]}) 21:15:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000270000000000", 0x1c) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0xff9f0000}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x60}]}) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x700f00}, {0x6}]}) 21:15:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000280000000000", 0x1c) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701000}, {0x6}]}) 21:15:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r2, 0xc, 0x1}, 0x10) eventfd(0x0) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0xa0}]}) 21:15:31 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xffffff8c}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x23e}]}) 21:15:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701100}, {0x6}]}) 21:15:31 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000290000000000", 0x1c) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701200}, {0x6}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x35c}]}) 21:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002a0000000000", 0x1c) 21:15:32 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x200603, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @host}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x144, 0x9, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x90, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x7}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0xffffffff}, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_to_bond\x00'}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x90fe}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan0\x00'}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x7}, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x3d}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x661}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x40, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x4}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}]}, @IPSET_ATTR_ADT={0x38, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x3ff}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x1}}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x24000000}, 0x20008000) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701300}, {0x6}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x382}]}) 21:15:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x40, 0x7fffffff}, {0x6c}, {0x6, 0xfc, 0x0, 0x7ff}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x2000}]}) 21:15:32 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xfffffff6}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701400}, {0x6}]}) 21:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002b0000000000", 0x1c) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x3200}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x3e02}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x4000}]}) 21:15:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d00000000000000000000000000000000000000000006000534554000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e6ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x260) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r3 = dup2(r0, r1) write$P9_RREAD(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="c6000000750100bb000000d84dd88a9a69e0556ae84c49af02d7059013fc189e82c7ac398b6988073d5544cc151271d884fddfc0143eba9f7a4c17384e3e08d79668c4ab285cc96fb99c22b0b7e2764cb4ebf07363aa3a4c4946413e20999325d7de2367e25b22506fc347469cd807e2739fd6ca5c553e93addbf175e46e41d9360df22fbb73e5c23df8d3e95a8feda8c9c383db20dc869e091aa4df66f613a6d0cc88e23acb37e6edf3839c684345853ea9e7886e0f8b577b275dfc37b60139409e115e8fd5f48b"], 0xc6) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x5c03}]}) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701500}, {0x6}]}) 21:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002c0000000000", 0x1c) 21:15:32 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701600}, {0x6}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x6000}]}) 21:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002d0000000000", 0x1c) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701700}, {0x6}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x8203}]}) 21:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002e0000000000", 0x1c) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x9fff}]}) 21:15:32 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x80000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000002f0000000000", 0x1c) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701800}, {0x6}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0xa000}]}) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701900}, {0x6}]}) 21:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000300000000000", 0x1c) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0xff9f}]}) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701a00}, {0x6}]}) 21:15:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x100000}]}) 21:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000d20000000000", 0x1c) 21:15:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x701b00}, {0x6}]}) 21:15:33 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x777e349ee06f}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x1a7ba8}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800000}, {0x6}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x1d7d76}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800100}, {0x6}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x200000}]}) 21:15:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000300000000", 0x1c) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x600000}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800200}, {0x6}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x800000}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800300}, {0x6}]}) 21:15:33 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000500000000", 0x1c) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800400}, {0x6}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x1000000}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800500}, {0x6}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x2000000}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800600}, {0x6}]}) 21:15:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000600000000", 0x1c) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800700}, {0x6}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x4000000}]}) 21:15:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000700000000", 0x1c) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x800800}, {0x6}]}) 21:15:33 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x8000000}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900000}, {0x6}]}) 21:15:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000900000000", 0x1c) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x32000000}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x3e020000}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900100}, {0x6}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x40000000}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900200}, {0x6}]}) 21:15:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000a00000000", 0x1c) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x5c030000}]}) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900300}, {0x6}]}) 21:15:33 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x5fff5fff}]}) 21:15:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000b00000000", 0x1c) 21:15:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900400}, {0x6}]}) 21:15:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x767d1d00}]}) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900500}, {0x6}]}) 21:15:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x82030000}]}) 21:15:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000c00000000", 0x1c) 21:15:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0xa0000000}]}) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900600}, {0x6}]}) 21:15:34 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x8000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000af0c00000000", 0x1c) 21:15:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0xa87b1a00}]}) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900700}, {0x6}]}) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900800}, {0x6}]}) 21:15:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0xff5fff5f}]}) 21:15:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000d00000000", 0x1c) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900900}, {0x6}]}) 21:15:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0xff9f0000}]}) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900a00}, {0x6}]}) 21:15:34 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x40000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000e00000000", 0x1c) 21:15:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$KDDELIO(r9, 0x4b35, 0x3) splice(r6, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r14}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r17}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r18, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r20}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r21 = socket$nl_route(0x10, 0x3, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r21, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r23}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r7, &(0x7f00000007c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)={0x1dc, r11, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wireguard1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r20}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}]}, 0x1dc}, 0x1, 0x0, 0x0, 0x20000800}, 0x48801) 21:15:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x3, 0xffff}, {0x5c, 0x0, 0x40}, {0x6}]}) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900b00}, {0x6}]}) 21:15:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x9, [@var={0x10, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f, 0x0, 0x0, 0x5f, 0x0, 0x5f, 0x61]}}, &(0x7f0000000340)=""/4096, 0x31, 0x1000}, 0x20) fallocate(r0, 0xc, 0x20, 0x7ff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x80000) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r6 = accept(r5, &(0x7f0000000240)=@sco={0x1f, @none}, &(0x7f0000001340)=0x80) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f00000013c0)={0x7, 'bond_slave_0\x00', {0xa25}, 0xfc01}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r9}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x15, &(0x7f0000001380)={@ipv4={[], [], @remote}, r9}, 0x14) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000780)=ANY=[@ANYRES16=r4, @ANYBLOB="080001", @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32], 0xa}}, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20308404}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, r4, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x81}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x97}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x200}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10c}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x200}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000015) 21:15:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000c00e00000000", 0x1c) 21:15:34 executing program 5: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r2 = dup2(r1, 0xffffffffffffffff) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000000)) [ 1009.418292][ T7367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7367 comm=syz-executor.2 21:15:34 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xf83f0000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900c00}, {0x6}]}) 21:15:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x4}, {0x6}]}) 21:15:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000f00000000", 0x1c) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900d00}, {0x6}]}) 21:15:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900e00}, {0x6}]}) [ 1010.217079][ T7402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7402 comm=syz-executor.2 21:15:35 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x100000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x30, r2, 0x1, 0x0, 0x0, {{}, {}, {0xb, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x8}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40c0040}, 0x48000003) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 21:15:35 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001100000000", 0x1c) 21:15:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900f00}, {0x6}]}) 21:15:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901000}, {0x6}]}) 21:15:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x6, 0x40, 0x0, 0x2f}, {0x6c, 0x3, 0x0, 0x80000000}, {0x6, 0x4}]}) delete_module(&(0x7f0000000040)='\x00', 0x1200) 21:15:35 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001200000000", 0x1c) 21:15:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901100}, {0x6}]}) [ 1010.574805][ T22] audit: type=1326 audit(1580591735.642:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7421 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901200}, {0x6}]}) 21:15:35 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x200000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:35 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001300000000", 0x1c) 21:15:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901300}, {0x6}]}) 21:15:35 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001400000000", 0x1c) 21:15:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901400}, {0x6}]}) 21:15:35 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) write$binfmt_elf32(r3, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x0, 0x1, 0x90, 0x2, 0x3, 0x1ff, 0x12f, 0x38, 0x2de, 0xb16, 0x0, 0x20, 0x2, 0xff00, 0x7, 0x8000}, [{0x5, 0x0, 0x20, 0x7fff, 0xea9c, 0x80000000, 0x80, 0x2}, {0x5, 0x4, 0x20, 0xee, 0x9, 0x7ea, 0x1, 0x2}], "c9ec5fd47ff75365d594893db443a3543c5bec36724903cc3d5bc49fda199168539ee14de528e8b23f7477bc8b479b64e4d41470e374172c541ddcfbdcfedddd025eeed08128366bffda62811ed54458a01904b34a22e4ad79dea0a1faf2df8174f47583fc687ae85e6a9ed633196f090da9c2ce594df3a641bb9b4243ab7e0a38706d1b889d4b6b2c784ec2989dbb20450fcf0a3cc90d08d60279881196b79bbe21bd69223307ca1a9e7286788a4721bfe287ee315e5227c06314c3d89435381b4ca36652edeed6317b125d41edb2ed0cfcf4c893adf78bcba05dc71382e2b9b951"}, 0x15a) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r10, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206040000a843090a26234d25000600080002000800000d0000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) getsockname$packet(r4, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r10, 0x8918, &(0x7f0000000fc0)={@dev={0xfe, 0x80, [], 0x30}, 0x6b, r11}) close(r9) splice(r7, 0x0, r9, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r7, 0x40045436, 0x4034) ioctl$KDGKBLED(r8, 0x4b64, &(0x7f0000000040)) ioctl(r6, 0x8916, &(0x7f0000000000)) r12 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r12, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901500}, {0x6}]}) 21:15:35 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001500000000", 0x1c) [ 1010.884613][ T7447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7447 comm=syz-executor.2 [ 1010.928110][ T7447] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 1010.949365][ T7447] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.378424][ T22] audit: type=1326 audit(1580591736.442:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7421 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, 0x1, {0x1, 0x0, 0x7fff, 0x5d738a8e}}, 0x20) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) vmsplice(r3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="1fa844ebf32cc22dc1d4f31ece94d57e901c88dc181d910152ff1354474058c5274401bd9e055ba03f0eef32e2577273307e32ce169b6e456c4940f5432972b780bd7fb6c10dcfe5f6ea3828df5ae2bed886874e6c345d66a9522f84c5b0bc0a814e819e563df9bde112fc699b16ac6598236ae3647d04ffa5d621837f12ecc22901c1ada4f1de634c0cd8e486fc9c0ecb34fd4a870e8b8e47c3a644c27e1d6223bbacd9b8d4b69dd1904220e67b2946734941673589025cf2a670133b80c8b86abffd067066ebb40f2ef3e67e7f0f22b264bfb798d3ea7354f894683df7c908741eab56c08685c6c36a009f05c493936fe46a2e560ac2e712e95a9d827aed"}], 0x10000000000000b1, 0x8) 21:15:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901600}, {0x6}]}) 21:15:36 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x300000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001600000000", 0x1c) 21:15:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x8, 0x40, 0x40, 0x43f}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8280, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380)='/dev/bsg\x00', 0x400000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@bridge_delneigh={0x1c, 0x11, 0xf07}, 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000440)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, r4, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x4008080) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xc}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x1) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="02000000", @ANYRES16=r1, @ANYBLOB="00012cbd7000ffdbdf251b0000000600210062000000080001000000000005009200200000000400cc0008009a000000000005009200090000003c00228008000400020000000800010001ffffff080003000400000008000100080000000800020008000000080002000080000008000100ff070000050092000700000008009a0000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x40080c0}, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000280)=""/9) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000300)={'HL\x00'}, &(0x7f0000000340)=0x1e) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000002c0)='syz1\x00') 21:15:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901700}, {0x6}]}) [ 1011.489605][ T7457] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7457 comm=syz-executor.5 21:15:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000000200)={0x3, &(0x7f0000000180)=[{0x4, 0x65, 0x8, 0x6}, {0x27d, 0xe, 0x18, 0x4}, {0x4, 0x3f, 0xff, 0x101}]}) r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffff, 0x20000) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000040)={0x8, 0x0, "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"}) 21:15:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901800}, {0x6}]}) 21:15:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001700000000", 0x1c) [ 1011.529939][ T7457] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7457 comm=syz-executor.5 [ 1011.665142][ T7480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7480 comm=syz-executor.2 21:15:36 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000540)={'wireguard0\x00'}) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(0xffffffffffffffff, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x5, &(0x7f0000000a00)=[{&(0x7f00000005c0)="c530bf662a325718659a1f3ad52d499512f3affe0da30af4966276abd55344635bcb24a72691937e06a2a9a9a9f7126e359e7ceede302e033d5891ad6789ca8f1fa26c4bd3f45cf15ddbf90723f1564968f666a0c336011de9af7e86016c1c3ac96607f568190173cdf34c75a290a604fe646b814f544157cef27ddfef66719d34b67e4aede0dc839767bfc6c0b756a020", 0x91, 0x2}, {&(0x7f0000000680)="500a25d6db0b8b6c65cafdb150cdd2d6884dd8167f411b0b3d1c11a93b4c7ad80585c3ee555e0a9f05aa491c485f2ed0916eef01c94ac2d489218c116c039fc29a25be829841550c21ff789973d4007d9ed807fcaaf7d6eae479857f1194a0495a7658aea96d50cdf240f09058b1f0ee901a36faacfb06f2c12af1a67efe1913ad2736f627c5b81a28b0ea29ec5e25c80b7440", 0x93, 0x9}, {&(0x7f0000000740)="0680a1bd48b9de676bdf156e6bb8ae03f280b20e0f5349e0958d0dc01b57bf3289ed63f5151766c21ccc14c5cb3af12cb4cdebadb6bc4166fe63e5f9c070263cd9939b9aa5b62a66f762d076a36e28ef807ba714da19edad2176361651f6ecb956bfed3e6bf88b98067d41b16893b614b53cb6adae11fae403b94eb63b350a58972412130836f5029a5f66ed9caee36c1401af33bfd8dc0f570524015b5dbef7de64b79ed8c62406c276925fbd8354d71f3ff2af116b542033ac1c4f6fdedb6d5c8352a2a523b895fff5413ce2c30c68af", 0xd1, 0x6}, {&(0x7f0000000840)="f8f27004c0da7ea3acb69bfe5fa0208cc53371b6f87d2ed383a0ed185151e782fb767e954d1b2102795beb33797ea4d0ba07337c7644f5e8bc5feb30dc743f8590764d1dc55446c83d3eb0ded80ba89b1494316551e0887f99b420ba0d7bb186fcf1f95e5bde2da02bc171f5a14c1eb712d3b62a5c1c3c4ae400242e19ac59d410a159", 0x83, 0x28}, {&(0x7f0000000900)="1718727f5b88ff00a57198580529b44930c9d3859f2a6f98fad1891cb57973b7ca98c0796a05266bf0049c124eff3e1486d62942773def0df19b124fed6356f08a8dca59ef476c969f8f143d41cb4594216f2de4cc822ee8ffdedbef77cf72b04262757af70eb8a8bbd4a9d81ead5125782e7091ab7e365d4720e01e11eaefd5acfa83a8724e517ba4c585c7bff516c9cff10e0f8d8e7d348b819fbbe4efa48cdaec76a60493b7d3a16e1b999cec30ebb01756accc64ff09665bbd7a67cdf48c7a37eb98333ae49eebb795375896efa1cd6826df96c0", 0xd6, 0x6ae7}], 0x29800e1, &(0x7f0000000a80)={[{@test_dummy_encryption='test_dummy_encryption'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@inline_data='inline_data'}, {@noinline_dentry='noinline_dentry'}], [{@smackfsdef={'smackfsdef', 0x3d, 'loeth0'}}, {@subj_user={'subj_user', 0x3d, 'SET\x00'}}]}) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901900}, {0x6}]}) 21:15:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000140)) unshare(0x20400) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r2, 0x0, 0x3) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000000), &(0x7f0000000080)=0x4) 21:15:36 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002e00)='/proc/self/net/pfkey\x00', 0x220000, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000200)='ethtool\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='\x95eth0/keyringem0}trusted\x00'], &(0x7f0000000800)=[&(0x7f0000000600)='wlan0{0[\x00', &(0x7f0000000640)='#\\\x00', &(0x7f0000000680)='wlan0\x00', &(0x7f00000006c0)='].cgroupwlan0\x00', &(0x7f0000000700)='SET\x00', &(0x7f0000000740)='\x00', &(0x7f0000000780)='SET\x00', &(0x7f00000007c0)='raw\x00']) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00P', @ANYRES16=r2, @ANYBLOB="00082dbd7000000001000300000005000200c300000005000200f800000005000200fb0000000500020008000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c4) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe7, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCGETA(r6, 0x5405, &(0x7f0000000a40)) fcntl$getownex(r5, 0x10, &(0x7f0000000880)={0x0, 0x0}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000a00)=0x8) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xf30, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_PID={0x8, 0x52, r7}]}, 0x50}, 0x1, 0x0, 0x0, 0x850}, 0x48014) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) creat(&(0x7f00000009c0)='./file0\x00', 0x118) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x5, &(0x7f0000000040)=[{0x406, 0x0, 0x0, 0x7fffffff}, {0x5c, 0xa5, 0x2}, {0xffdf, 0x0, 0x4, 0x1}, {0x7fff, 0xff, 0x7f, 0x5}, {0x8, 0x7, 0x1, 0xa28}]}) 21:15:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001800000000", 0x1c) 21:15:36 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x400000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901a00}, {0x6}]}) [ 1011.828246][ T7487] overlayfs: overlapping lowerdir path [ 1011.839565][ T22] audit: type=1326 audit(1580591736.902:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7485 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 1011.870414][ T7499] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7499 comm=syz-executor.2 21:15:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001900000000", 0x1c) 21:15:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x901b00}, {0x6}]}) 21:15:37 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) clone3(&(0x7f0000000280)={0x80900, &(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0), {0x24}, &(0x7f0000000100)=""/163, 0xa3, &(0x7f0000000200)=""/64, &(0x7f0000000240)=[0x0, 0x0, r0, 0x0, 0x0, r1], 0x6}, 0x50) sched_rr_get_interval(r2, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x100) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000002c0)="cd", 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r3, &(0x7f0000000080)=""/79, 0x4f) keyctl$KEYCTL_PKEY_QUERY(0x18, r3, 0x0, &(0x7f0000000380)='}\x00', &(0x7f00000003c0)) 21:15:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000001c0)}) 21:15:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00000}, {0x6}]}) [ 1012.654551][ T7503] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7503 comm=syz-executor.2 21:15:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x81, 0x0, 0x0, 0x80000001}, {0x6c, 0x6}, {0x40, 0x0, 0xfe}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000f40)={&(0x7f0000000e80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000f00)={&(0x7f0000000000)=ANY=[@ANYBLOB="31003f00000000f597024152cf74c25ddf560e9792b351d2e3845c8e0f8240"], 0x30}, 0x1, 0x0, 0x0, 0x20000801}, 0x48001) 21:15:37 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001a00000000", 0x1c) 21:15:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00100}, {0x6}]}) 21:15:37 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x500000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x45) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)=0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x7}]}) 21:15:37 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) r9 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$GIO_UNISCRNMAP(r9, 0x4b69, &(0x7f00000005c0)=""/123) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) 21:15:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00200}, {0x6}]}) 21:15:37 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001b00000000", 0x1c) 21:15:37 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4101, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00300}, {0x6}]}) 21:15:38 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x20) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x170, 0x3, 0x1, 0x201, 0x0, 0x0, {0x2, 0x0, 0x5}, [@CTA_LABELS={0x1c, 0x16, 0x1, 0x0, [0x3, 0x955, 0x7f, 0xffffffff, 0x8, 0x7]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1000}, @CTA_NAT_SRC={0x40, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @remote}]}, @CTA_TUPLE_REPLY={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x13}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x10}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_NAT_DST={0x70, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0xfff}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast2}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x7, 0x0}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @remote}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}]}, @CTA_SEQ_ADJ_ORIG={0x24, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x6}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x4a}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x45b4676e}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x80000001}]}]}, 0x170}}, 0x4) [ 1012.898253][ T7549] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7549 comm=syz-executor.2 21:15:38 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x600000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00400}, {0x6}]}) 21:15:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x22, 0x803, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xffc1) renameat(r5, &(0x7f0000001600)='./file0\x00', r1, &(0x7f0000001640)='./file0\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x1, {}, [@IFLA_MASTER={0x8, 0x13, r6}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet6(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x30, r10, 0x1, 0x0, 0x0, {{}, {}, {0xb, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r10, 0x1, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20001010}, 0x80) sendmsg(r8, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206026100a843090a26234d25000700080002000800000d0000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000640)=0x137) r12 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r13 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r13, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r14 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r14, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r15 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r15, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r16 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r16, r9) r17 = socket$inet_tcp(0x2, 0x1, 0x0) r18 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r18, r2, 0x3, 0x1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r17, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f0000000400)=0xc) sendmsg$nl_xfrm(r1, &(0x7f00000015c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001580)={&(0x7f0000001680)=ANY=[@ANYBLOB="281200001500020028bd7000fcdbdf25ac1414bf000000000000000000000000ff0200000000000000000000000000014e2300004e220004020080802b000000a769937cb180e29861bcbbb917d3614ff1bea76a01369f29", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r11, @ANYRES32=r19, @ANYBLOB="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"], 0x1228}, 0x1, 0x0, 0x0, 0x24004810}, 0x24000082) 21:15:38 executing program 5: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)=""/194, &(0x7f0000000100)=0xc2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:38 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001c00000000", 0x1c) [ 1013.072418][ T7567] netlink: 'syz-executor.0': attribute type 7 has an invalid length. [ 1013.099845][ T7567] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1013.145438][ T7574] netlink: 'syz-executor.0': attribute type 7 has an invalid length. [ 1013.161350][ T7574] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1013.689063][ T7581] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7581 comm=syz-executor.2 21:15:38 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@mcast1, 0x19, r4}) r5 = socket(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf71fb33b3a20bcb8, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x7f}, [@alu={0x7, 0x0, 0x5, 0x5, 0xb, 0xffffffffffffffc0, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x6, 0x1000, &(0x7f0000000fc0)=""/4096, 0x41100, 0x5, [], r7, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0xb, 0xff, 0x9}, 0x10, 0xffffffffffffffff, r1}, 0x78) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r8, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r11 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r11, 0x2, r10) 21:15:38 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x700000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:38 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) timerfd_gettime(r2, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00500}, {0x6}]}) 21:15:38 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001d00000000", 0x1c) 21:15:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, 0xffffffffffffffff) 21:15:38 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) munlockall() 21:15:38 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x181c81, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0x4, 0x30}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 21:15:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00600}, {0x6}]}) 21:15:38 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001e00000000", 0x1c) 21:15:38 executing program 5: write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x8, {0x200}}, 0x18) 21:15:38 executing program 0: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)="2425786dd5c208655a5b14a4cbe520a641bce6bf8af4a2bbf5e6de76b4ad852d04345b") pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe7, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000080)) syz_open_dev$ptys(0xc, 0x3, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x6}]}) [ 1014.703895][ T7619] selinux_nlmsg_perm: 1 callbacks suppressed [ 1014.703905][ T7619] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7619 comm=syz-executor.2 21:15:39 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x2, &(0x7f0000000100)=[{}, {}]}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00700}, {0x6}]}) 21:15:39 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000001f00000000", 0x1c) 21:15:39 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x800000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d00000000000000000000000000000000000000000006000534554000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00"/608], 0x260) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000200)=0x5, 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r2 = fsopen(&(0x7f0000000280)='virtiofs\x00', 0x1) r3 = dup2(r0, r2) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00012dbd7000fbdbdf25040000000c00d0aba75d1b040002000000090000000c000400010000000600000010000400080000003c00000004000000050005"], 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x4004010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0xfe00}]}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/610], 0x260) ioctl$sock_inet_SIOCGIFADDR(r5, 0x8915, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e24, @loopback}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r9 = perf_event_open(&(0x7f0000000580)={0x5, 0x70, 0x40, 0xf7, 0x5, 0x5, 0x0, 0x7ff, 0x8000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xc2, 0x29a47ddd9e8f83a4, @perf_bp={&(0x7f0000000640), 0x6}, 0x200, 0x0, 0xffffe0af, 0x5, 0x7, 0x1000, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r9, &(0x7f0000000600)={0x4}) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) dup3(r6, r7, 0x0) 21:15:39 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r4, 0x0, 0x8003, 0x6) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f00000000c0)={0x0, 0x80000000, 0x0, 0x4}) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x4c, r3, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x33}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r3, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x44800) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000040)={0x8, 'veth0_to_batadv\x00', {'netpci0\x00'}, 0x401}) 21:15:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xa00800}, {0x6}]}) 21:15:39 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:39 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002000000000", 0x1c) 21:15:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) accept(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x80) 21:15:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00000}, {0x6}]}) [ 1014.889296][ T7646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7646 comm=syz-executor.2 21:15:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x6, 0x2, 0x0, 0x80000000}, {0x5c}, {0x6, 0x6}]}) [ 1015.005577][ T22] audit: type=1326 audit(1580591740.072:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7661 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x80000000 [ 1015.697040][ T7663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7663 comm=syz-executor.2 21:15:40 executing program 5: sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x2, 0x7, 0x801, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x7}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x4}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8040}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x383582, 0x0) write$selinux_validatetrans(r0, &(0x7f0000000040)={'system_u:object_r:crash_device_t:s0', 0x20, 'system_u:object_r:clock_device_t:s0', 0x20, 0x6, 0x20, '/usr/sbin/cupsd\x00'}, 0x6d) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000240)={0x8, 0x6, 0x7f, 0x7fffffff, 0x3}) 21:15:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040), 0x10) 21:15:40 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x900000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00100}, {0x6}]}) 21:15:40 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002100000000", 0x1c) 21:15:40 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) vmsplice(r3, &(0x7f0000000600)=[{&(0x7f00000000c0)="2a2bedfc63e407e19c05dec66ada536cfdfd0ded1febc1e7019a", 0x1a}, {&(0x7f0000000940)="1608615fabdb1cd2bb5639c3592caf203119335a8afeaf7122f736bece4d4191f4d5e8d076902bc588dadecde97f24e1f2936a959aad4f52782b39232b42e8d2b7afa512ea5c1f76608513693a77d62c6ab80d8c72feaaf8db1b83fafee97922b8eb1766b9042826138986860f082dfc6f6f5670ebf63aa8162baca2d905f9731399f5e50aaa1cc1a618cfa7903e3dae0c6227aced68e8719ae826913443e625c79e962766dcf8085911574d9796e193db4af370f9395be27443eb37c5fcbb8e19e3d49040bd14539b873fa91c31a40a871a4ca40adf52cdd57951de5074672995fbf340ffcd97c0", 0xe8}], 0x2, 0x3) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@isdn={0x22, 0x9, 0xb9, 0x0, 0x1}, 0x80) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xffc1) getsockname$packet(r6, &(0x7f0000000ac0)={0x11, 0x0, 0x0}, &(0x7f0000000b00)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@rand_addr="5cf537c2ff0f75dbf11e8797cdf5a148", 0x0, r7}) socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r8, 0x40045436, 0x34) socket$inet_tcp(0x2, 0x1, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) clone3(&(0x7f00000008c0)={0x180880, &(0x7f0000000100)=0xffffffffffffffff, &(0x7f0000000540), &(0x7f00000006c0), {0x1f}, &(0x7f0000000700)=""/159, 0x9f, &(0x7f00000007c0)=""/143, &(0x7f0000000880)=[r10], 0x1}, 0x50) ioctl(r11, 0x5, &(0x7f0000000640)="2a06ad9a88f2b21cd0b9c878fe99f3b2bfef6e0ea075a0a09ea6fae5c6f8a2b11b7a1a76c94a56fe1bd61365e2d2706400be0a9b25ccdb523f1fa219705cf5f2f16ac9dcc677606e09eb1bb92de740f7d1c66238d5165bf8c2e12a3b060000a808702ae9ee992f81cf5d9e7f128bec28acdb18271e8b51d102") r12 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r12, 0x8907, &(0x7f0000000280)) 21:15:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f00000001c0)=[{0x6, 0x40, 0x40, 0x7fffffff}, {0x5c, 0xc0}, {0x6, 0x0, 0x0, 0x401}]}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_getoverrun(r0) 21:15:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00200}, {0x6}]}) 21:15:40 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x8, 0x129, 0x5, 0x9, 0x8, "4b2d6493b2cf5590d9ab195de98bc036f4f932", 0x2, 0x10001}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x6, &(0x7f0000000100)=[{0x1, 0x8, 0x3f, 0x2}, {0xffc1, 0x2, 0xdd, 0x2}, {0x2, 0x6, 0x34, 0x7}, {0xfff8, 0x5, 0xfd, 0x9}, {0x8, 0x9, 0x8, 0x81}, {0x1f, 0x2, 0xfb}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe7, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000040)=0x1) 21:15:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r2 = getpgrp(0x0) tgkill(r1, r2, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x2, 0x801, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x4000) 21:15:41 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002200000000", 0x1c) 21:15:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00300}, {0x6}]}) [ 1015.923661][ T7688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7688 comm=syz-executor.2 [ 1015.937615][ T22] audit: type=1326 audit(1580591741.002:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7685 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:41 executing program 5: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x80000003}, {0x5c}, {0x6, 0x0, 0x8}]}) 21:15:41 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xa00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00400}, {0x6}]}) 21:15:41 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002300000000", 0x1c) 21:15:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00500}, {0x6}]}) [ 1016.057003][ T22] audit: type=1326 audit(1580591741.122:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x80000000 [ 1016.722505][ T22] audit: type=1326 audit(1580591741.782:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7685 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 1016.755106][ T7717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7717 comm=syz-executor.2 21:15:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x8000) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r6, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:41 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x402040, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x0, 0x2, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80090) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x30, r4, 0x1, 0x0, 0x0, {{}, {}, {0xb, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r4, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x20004000) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$int_out(r5, 0x5460, &(0x7f0000000540)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ftruncate(r6, 0xcf7) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x23, 0x200001}, {0x6}]}) 21:15:41 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002400000000", 0x1c) 21:15:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00600}, {0x6}]}) 21:15:41 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xb00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:41 executing program 0: ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'macsec0\x00', 0x1}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:15:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) arch_prctl$ARCH_GET_CPUID(0x1011) splice(r0, 0x0, r2, 0x0, 0x4ffe7, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x5) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000240), &(0x7f0000000280)=0x4) socket(0xb, 0xa, 0x20) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe7, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c, 0x80000) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000380)={0x2, 'veth1_vlan\x00', {0xffffffff}, 0xf31}) sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20008001}, 0x4) 21:15:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00700}, {0x6}]}) 21:15:41 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x488940, 0x11d) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000040)) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 21:15:42 executing program 5: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x7}, 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) socket(0x5, 0x3, 0xc4) 21:15:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00800}, {0x6}]}) 21:15:42 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002500000000", 0x1c) [ 1016.925265][ T7743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7743 comm=syz-executor.2 [ 1017.710493][ T7758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7758 comm=syz-executor.2 21:15:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x6, 0x3, 0x40, 0x7}, {0x922, 0x78, 0x9, 0x100d0cb}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000040)=""/166) 21:15:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00900}, {0x6}]}) 21:15:42 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xc00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x2, 0x0, 0x7}, {0x5d, 0x0, 0x5, 0x3b6}, {0x6, 0x0, 0x40, 0x3d}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) splice(r4, &(0x7f0000000180)=0x6, r5, &(0x7f0000000200)=0x101, 0x26e, 0x6) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x30, r3, 0x1, 0x0, 0x0, {{}, {}, {0xb, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x10, 0x70bd25, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8090}, 0x20000000) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='xfrm0\x00'}) 21:15:42 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002600000000", 0x1c) 21:15:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getroute={0x14, 0x1a, 0x4, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x4) splice(r0, 0x0, r2, 0x0, 0x4ffe7, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008050}, 0x20040004) mkdir(&(0x7f0000000000)='./file0\x00', 0xcc) 21:15:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00a00}, {0x6}]}) 21:15:42 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002700000000", 0x1c) 21:15:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x9, 0x9, 0x0, 0x6}, {0x8, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x1, 0x2}]}) 21:15:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00b00}, {0x6}]}) [ 1017.881287][ T7783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7783 comm=syz-executor.2 [ 1018.697024][ T7786] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7786 comm=syz-executor.2 21:15:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0x28, 0x6, 0xfd) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x8000, 0x7f, 0x0, 0x7fffffff}, {0x6c, 0xfc}, {0xa}]}) getpid() 21:15:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00c00}, {0x6}]}) 21:15:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = dup(0xffffffffffffffff) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000000)=""/159) 21:15:43 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002800000000", 0x1c) 21:15:43 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xd00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe7, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, &(0x7f00000004c0)) sendmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000040)=@l2tp={0x2, 0x0, @local, 0x3}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="9d6616b689ea6c3602d7a5a3aa1fca90d2bfc4f119bbf950ce9ba9526a45a9c5bd0f7347ecbecbfd76e4d1aabcd3", 0x2e}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="b1f98eafd85e2ffb908dabba5a7cae082306d939270ab96f0a379d7a7f5d0c5b327fc08659f51f713bc5868c86c5654c94784895143df7ad6f2b461a010821352bed831d2b5fadb25ee993c4e2af175d093dbc4ea83377695ca24a26773d049023081aca9458e66b56ed48cfb2a02a0c5938fcc77acc27568e7b6d55962c39101eb3b82b1b64ab65dcd4cee0cbd2e566056a8276f69143f8a2af97fd60efd217785850cd5d4f33b46ff8b3a85e165961ba346d49e64b51f2bd90ebd3e27c4e4fc1db49e0e12db7fa0de49e9ec755ced036c6efa2c106b0d441ac92c18c375a3e", 0xe0}], 0x1, &(0x7f0000000340)=[{0xe8, 0x10f, 0x7, "1b6f27331507c8e59cabdbe7da340d7c69a7f73644c3838affb0886ef368692f7bca49b153c96af51e3cfc1ec42c419ce7aa9a696f1d24c5077201c7b95008141a5fb21c584b8b497ddfdf6700aeadd7aea9a1c39625a02087a329582c7b89ddd5f0939917173710919601b3614d3e3fdb75ef8047132255f83141d0169c4e717118a785eac61e21c66f5aca14976e63a0c936a1ded3efa635a8160c690aa350a4ecc403adcc9daa587a39e6c3fbb0a62c49791a46db5a0d48d4d99269cbb0318271c47888d1733d9fca2d64f43ed40c15025bcbd83d5400"}, {0x18, 0x10a, 0xffffff01, "914784254fbdac12"}], 0x100}}], 0x2, 0x0) 21:15:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x1ff, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x3}, {0x6}]}) 21:15:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00d00}, {0x6}]}) 21:15:43 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002900000000", 0x1c) 21:15:43 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, r1, 0x0) setfsuid(r1) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="eeba1bb7a1237af946b51f0adae63295db0d5545bb54d277182613c467fdc571b226b5216c3524984134794f979bad9a84b04130d40508142c16266aa0327d862b38", 0x42, 0xfffffffffffffff9) keyctl$describe(0x6, r2, &(0x7f0000000640)=""/202, 0xca) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:15:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) [ 1018.880281][ T7815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7815 comm=syz-executor.2 21:15:44 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r6, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) sendfile(r9, r7, 0x0, 0x9) ioctl(r5, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000001f00000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d5353000000eaff00000000000f00000000000000000000000000000000000000000000000000000010000000000000000c0000000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000ebff0000000000000000000000400000060000000000007000d0000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x260) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00e00}, {0x6}]}) 21:15:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x3, 0x7, 0x70, 0x4}]}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 21:15:44 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002a00000000", 0x1c) 21:15:44 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xbac, 0x20}, 0xc) mmap(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x4, 0xc0d0, r0, 0x40fc0000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:44 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xe00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x5, 0x0, 0x2}, {0x6}]}) 21:15:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x0, 0x101}, {0x6, 0x10}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x9, 0x80, 0x7, 0x8}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='ns/pid_for_children\x00', 0xffffffffffffffff}, 0x30) pread64(r3, &(0x7f0000000240)=""/245, 0xf5, 0x4) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe7, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) 21:15:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb00f00}, {0x6}]}) 21:15:44 executing program 0: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/fscreate\x00', 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x4, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x7, 0x0, 0x3ff}, {0x6, 0x0, 0x0, 0x7fffffff}, {0x6, 0x2, 0x20, 0x2}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0x1, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 21:15:44 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80000) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/229, 0xe5) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x7, 0x7fffffff}, {0x5f, 0xfc, 0x0, 0x8}, {0x6}]}) 21:15:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01000}, {0x6}]}) [ 1019.876245][ T7858] selinux_nlmsg_perm: 1 callbacks suppressed [ 1019.876256][ T7858] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7858 comm=syz-executor.2 [ 1020.650452][ T7867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7867 comm=syz-executor.2 21:15:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x3}, {0x4}]}) 21:15:45 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002b00000000", 0x1c) 21:15:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01100}, {0x6}]}) 21:15:45 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xfffffffffffffff}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x81}, {0x6}]}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x260) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r5, 0x0, 0x8003, 0x6) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f00000000c0)={0x0, 0x80000000, 0x0, 0x4}) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x4c, r4, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x33}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @broadcast, @dev}, &(0x7f0000000140)=0xc) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='~\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="10002cbd7000ffdbdf251000000008003400090000000a000900a5c7a0a513de00000600280002000000050033000200000005002e0000000000050030000100000008002c000700000008000600", @ANYRES32=r8, @ANYBLOB="05002e0001000000"], 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$inet_udp(0x2, 0x2, 0x0) close(r11) splice(r9, 0x0, r11, 0x0, 0x4ffe7, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r10, 0x800c6613, &(0x7f0000000400)=@v2={0x2, @aes128, 0x2, [], "bd03d649a3f9a819f42c49412b5c35ce"}) close(r13) splice(r12, 0x0, r13, 0x0, 0x4ffe7, 0x0) r14 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) read$rfkill(r14, &(0x7f0000000080), 0x8) 21:15:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) write$binfmt_misc(r1, &(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYRES16], 0x6) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x6, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}]}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r7, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) r10 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r10, 0x4, 0x46802) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r11, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) sendmsg$inet(r11, &(0x7f0000000680)={&(0x7f00000005c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000001fc0)="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", 0x1000}, {&(0x7f0000002fc0)="67326e360e40aeaf53e0486577802e455785ac52f80587fb9d3c3f66a193e4b048505a7f257d4b61c7c8f0e0d54f39c7b02a00bf5238b4d2f929d82a7568832d539c86152a0a91d5126b17e07fe8110f4ecc1d394da77e86353bf4ef464119f5f373ac2c2576ccd8b6983ec23696229e38598e9639d660c02fd656e016ab089e65772fb9dae7348476859bac38c05d7bcb29488fa6ff5eabee8a2ccc8b9064e4f123b2d45a1c6f89eba804ca6cd445a69ad109f50be6c81f6fd14f08b71e8176ad5b99cc6c9a5b130bb4241216bd5c8f03763729611d5e5a1793b66ac849a5326d83a1098ba7fc77c334ae6e61ebb93a0219daf1d69c33aa494a7ff647bcc3376242467c18bcc2c5f57243e114b5810f34f4039698073da976b858a8ef5b8ff8b1d41f57ce90532b1431a48945073870bdeab8ac2ad578889b1abaed7952c26595cb3172244c011f10629008e01edc3a4acaf4b48f3ee8df3a00402ae036dfab29f9982b39cc13307be36c0f1ee68a75a8dc465ffab3556229b7e0123bc415e24223e5301f26cf81fc22aff9fa86bcf8edbdb6049559c6cd04fce83119321c220b675f738fffc192c820daeb18f5a1d81d07090c85704a28fc202c96ff44a8da3aad55b9ef296bf71685f831b13238902a455a43971fb215cd4229b9382d10cfca3b19617f573db7571348a1f35f337ff721a7cd2fdc36cf57ecb2996ecdf73d6cac735865b901c59fc9ef1bf4181ed99da3877a2ad29e962bfd78807a55b0dfef505609774013a404c13b2a770f51b9023c93cb85b2f21f1fecf0133a24f3e456eb828c55a9e2958b33788824071c248910fddc446e4d0e8eae8139c48737446cb80102f43dee3cc08265b8ab0f7c3731d64b9131c0c7b06cbb490da30396d3c5035b6bdd45141d2a1a98b561758bc60c42e33769d4f8c8aad54d24617eb30f9474d2e00f272ed8391cdd67192a416bef29a0ad1a0e86f7cebd0f212c32ea954bc9332e82524801c03ae3622d21e2e133c9438f8f50e99ace6d660fddb9d09e0759fe342acba3289a68ee617a95a8dcf812cbbf61dd022b4284e0d431574425a3aaf601e99f6622775bb71f6eb473920e75a27e3e2ed97096efd2a63a758ecc34366ff41585e5aa4b500f8e3dd7e4b456277ab726d59b2a38bb2c04741d42be3da4451e73822ab553ce5b51fef35ef5fd31dc582889542cdf0b29bf44e73e7e67d08d169906344281d29095ee45966b386f4e990931e664f5182b55133b082e0b512e1a2184ecdbe210448f15db7354be7eaf864155cdb037e408110823db20913eb408836bf4092b3add2d433db8fdda8928621ef70768d87946be9ef9d66b658755da792d3e01da3acc2d07b7a7937191292de2d8b472b8a04d1f274203240418f963b55ed1e6bc7d67609599b2be5bbe5e948ef199a825829a089397b7b44458855bbf2270cb4b1c6ff9c9d330612cacb67b7233c76242a4f2b663168eae3f642f91a7a925eff58f2183d97306b9128e7a0714c79ab3ec740a47bb4ea6aeef6f88f90f638df33e815c1f63a79c3ae0e47175fba95181a20668c91ff631caa2708941112a4ef3f6cf271dd863c0db22ef4ab7e8379d5f40f9520aea9e2586bb8e78c5da1dd6eb263042a26464f40a6b9f1db3cc14a40cc7d2247fb408c0ca3f400b053024eb59e3af6c2c19254865318e1af876d17983b7ac73a1b47a8125b5db8b1d9f0c33c7eb3e32f2cd1a300841b019869b40deabbd24486f319d8a6d96cdfd0673f6f5de8d5056ae95b3081066e8506338ae277bbb0aa2c8df49a947332e9f6ebcbdc9d2c403eab433d403a6dde405a06945193e895b3d9b2bb3697b2a5fdb39cdbb34879d26071fd746f7c27783f3bee19144f45d5b9efe3daa110e1210c3a5d2b7f0351cdad685dd642a9fc0bb2fe9d7118fcf771e558e77a7cc40e4d6e65a1461ccc8dd5926d67d9288404044efc870ea9ae5e2c87661936630f51192e3603ccee1e8b04f8890e1ce527bad36469f9b75480fa75234b7bfa72332afb1be9035f7c9f7db2223237313febefc1b99348e8450cb650c6fb11457a4af35bea4b3feaa14fb55474262e64be6ba940475954f867128df1693452dd5493b596fcb3b0b871bc0bb02b45d4ba5f149ec46533f5c41a62dc395625fd270d49a4e1bf0d4cf2cb753b69837e606974683d05c90be65c325a24c0bc188ad093f682e32bf7ecda847f47955884452d346da0d548dbd12812ded28eb452e62db6afcdb71e7a91db3770171c4bc3398f0686ccc71a551966b6016b8b6e36a1c94186ef74616ee0c47dddbebe6171e62a709f9ed9b52598edcc40f6dcf1089ed0b40c8a46fd6967196da9074044c4fd5991f42848c99f727d781cd5dba9744de887d42ea36305502286886900471975e5be104172026b93a86786bfe43ec4219a4dea12e865daa5edd77469a8c2a4715d532c79e80758dea9b0a54f5a7512c000cd1a2480dca50b32672975922b8f8aa22e0b4db7623974faf94e392e08268660c703189f74c8363479b8adc30c17b841ad50529681367a549af6e002a39ec6088bcfc5f5c7a30cb998a11e07efd8fa3dd12811948b85abeab530519c1c5bae2dd41dda70a5a00b40860ba3e7f99dae16becd1e52bd51f57442f320b148d9b7d41379c9a6bdf610e5f3e2419a26a163e1f3bf653fde6803426866636298243d1cb223358c8d51f14c363623574eee8cfe5cdb84b982eb828b58a37ec12028af9e6a7325347316caf180c9da8343f74a809273dfd1920076792f8dfa4e592e83f2b9cc6dbfe7a3b1b064f55c5241a69d5a2e41ee61d4ecd95f9c25a0f10eebdae45cb445982e0b25bcc84bba47d3833fb53877fd88fac65c5fb3519e98dd9779fce548f659907598e18a66f05b603f57c65ca6c4c222bda07b31200974ce1d6d228ca0bc3ce1c1211b94404b6428d203847425101d5f2c9b73cc2692773c32a64ec196bf1e483c3e1da6b0f07cd1f1160d4262d24fa49b7425b35234fa0de6c4bb6053becd5ffa44c0f98e5cb42fa9333c4c507f82b29452534028a30da2a17207e886a28127bb3287b1bffbcbf6ed51718a52f88e686e7a142b08c4d7ba251c43ae2a82933414b6b9fb6fcfba9469a7a625274a4f899c7d80f2ec4548c9e5c09c1771f8413082d4f456de4c6bc03f48f482489622d570917e015bc25d6ae0875166a898ebcb4bf646f8a365e5b5fc357cd884fd0f37a0889dc9ae2753bc116bc789571b508e4af8e2e81c51e5b2538d381d26caf8c5341df0784a5b2f2f91d9a5a06f8f2aacd8ab77ff9ad8cc193f7ac05ef698b395b07ad1c0d39ac086f8e2c09e98b5fcb25a5f029d41c8ce06c6e4d45a0f5e2147cd27275bdfef08936851dd005b025707eadfedde51153111c638621bb2fa3003ca4edfb7e9810042f5b1cf0c12564725bf5dfaf45e2082e69cdf53200a1b2e16d3a5f7c8035c1827950b259f64d3ae2e73aef01fcee0be75684bcb00cc7d4fe5299909ad2c1108845c4dcb1feeddf835aa72716344866bea3dd7c44b7cb1c6a933c53d5aca30d4800d5bfb27c7d51384d6bcc7b424b3114be7eed43ceb621bc74dc75eea7774961e559a9fe00db9602602920957a4316b5b06a1fe3b6928bd5104c41870e26abb04364646f48ad6a2ac76e482f5d4ac9cd5ccebf7f79ec16407863837ad909bd7a7f423d774949eb6cebb7d332d7b2b7e53b6be1b388c11a0c31eba12643bea965580b3ca1d5068eea6e0beb19e4c2b4f37eb2eae73d52d3514b856011dd7d5e35e8ef8b512c7ffdc0124e5e320034db9d2567a25f42c2fa563c1331a2196d56cc59ceba0f9ef18535a54f14cb8c8802e193d924d9871a48849a299624254c8fea53a13ac2ebf89dd3a39ea828809d040a1c7988a1b9f71909c97fdc29a1652291d6c35c04aee0de971ebcb86fd568637b1d18ed65e20464d81fefad7c0890c6d36582b8d0ecf8e96308e07b2ceaa32090fc60bbfc72a4d42fc939394f5acecfb512ba2b97023aa693025f91af6bd5e3aea5d3ad89f8abdbc133df4f5eec822077d5d1e52a0908a8ca00dcd30eb038641d3ed60fc5c61a3d657474936e144dee78fbf8e377253dcaffbbc01923ec6119ce9e2c8d0e0e8592e12c4d1270be97b5ad10190df1e030fca1db03045abe693ef22d94f47bbab8b958c7c06a6b6bad3c4b2b52718beba18d1ffc2c3c05bea64ec23aa6145a048106020818c5d1c97c113967b1aa2989ac8bc63199067b36785eac4ddac3f6f18ff8d978909a26c191a23465396949c61d6975fea92f220ba9938c5eccf65ca661c14bd27d3939a497eadcccd071e3b31ce74b130ff0aa6b13771d582233c497c0f63cfd987a4deefa2b6654d811b9ea52282fd7f14f6d97c18d73928fffe2631fa53ad056353d52791de38365862a064ae3292d005a92a91d96def5c315b3e02ac41da775cb7b85fa994a76e7d410a15c1d9d8f950a0eb22b029ee31bdb9a0ab113db4cfd47284a97125d33029bd6bc78af5a50747d6fbb8864117cd09886ddf77175045f7dde637ce4bd346a0b3ec5a524a40f9bf3411d229278b60d06f94d06adbf0b9e5280c3680ba6ce7747e961936b740df431aa947e7090ec5299e77c5cfdd74c92aae4f895ae469bd92bef76ee4f0b27d6c29b5b9d2ec79c0899ab0bc174a688304b49906275ec5b18db954e2c96669be749c5c1a7787eb6f0a9f8fefba18174a93415f7fbfecbbe93e41ebd359399dba6c1faebf30548dfdc7acbb0045cf2afb41af0d3ba526336ef94adc242b7c3f689c50ba6b6f53bfb71cb682e6a230318db7d622270f1fc61ae9301acca8ecdfe22a2b51ea58a95aa31e447b5768ce6d6c8e464dd82e015580eb3ded5b044163addacb3fd2d46b731e18b9481983ae3399fd36af2dbff39e361faa18e86c27151d86d2e16c89922934430d159020b9819a309088f0b9b8e709a842b371805697f25c13ee1dd37aad25c86566ef47497c21f65f041492c80aaf9437a1879fed9da51ec694e3787dbdb9055e5a82f4717cc92422e4897e85a190d93844c99e070d2c5360aefde25b0926f73e016552e9f7e60b81341d3e0df2f611a33a48ac2d31a7b256b8e56a74ca58189d6adb60e0c2a76cd828c8d276b82482541e91a795b9bdfd6269a6647b1302d4c3a0f838e894130c269a39193c10c6c557e8516b636120986e8769a8d491e94732bc1a2078c65787090b04a0bdf6ebcebcf9adea564d826367c266af573a557f016fd7aea156c701bff2c1b10c91db70b92df64c168e394317c8788baf5fdf815dbcc53a469e71d53f229b0120f0a6854d12e76a09a2d23b2bb3391aa7eaa4c348edd4bf35166c64d0bd6f33b6bac6e3243cf1e4ec50c408f2078a65ba8514380207189ee0238582f50e533f5bb45e6cf1a8bccd457b2bfd45f51db109e681f07e18afa58ec0e2545fa72fb85f427da58d57382ca3b94b00a4d91b164cd31c8499690a2610e65c5601e003c9d4226d07100c5fdc136e2ed112820ba54c3731bf431025dc0028be72866891052a2ca0bc29b66a5ea29708bf584101c0f4ab2b664547a27982bdf471f7de475654cdd03b33060553ce23226735c83b692ebbbe8879bd3f7d05419f217093678ce2c633905b358b43ee19e327cc2b522570c3be9203afd0267d94360f654ed79841ca490fac1a65b20a28c89d27198b446bd41efb00a48bb5d776312888f3d14a7038d5d2b0a3f21612d2f127a4a381cab6c4c3803b3db09018764dfaa82fc78e03e094be50ea733", 0x1000}], 0x2, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xea}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @multicast1}}}], 0x38}, 0x404c0c1) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r12, 0x1867f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0xff0f, 0x0, 0x1, 0x0, r10, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_cancel(r12, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8, 0x3ff, r0, &(0x7f0000000fc0)="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", 0x1000, 0x7, 0x0, 0x1}, &(0x7f0000000100)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01200}, {0x6}]}) 21:15:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x282881, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x14, 0x5, 0x1, 0x801, 0x0, 0x0, {0x2, 0x0, 0x3}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x200408c5}, 0x8533a2ba8632d713) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000040)=""/243) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/203) 21:15:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01300}, {0x6}]}) 21:15:45 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002c00000000", 0x1c) 21:15:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000040)) 21:15:46 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x4, 0xa3, 0x7fffffff}, {0x5, 0x0, 0x8, 0x8}, {0x4, 0x0, 0x0, 0x200}]}) 21:15:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x1, 0x0, 0x1}]}) [ 1020.899285][ T7895] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7895 comm=syz-executor.2 21:15:46 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') 21:15:46 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002d00000000", 0x1c) 21:15:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01400}, {0x6}]}) 21:15:46 executing program 0: chroot(&(0x7f0000000000)='./file0\x00') [ 1021.695699][ T7902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7902 comm=syz-executor.2 21:15:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x2) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:46 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1000000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r1 = dup3(0xffffffffffffffff, r0, 0x80000) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000000)={0x7c0, 0x10000000000}) 21:15:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01500}, {0x6}]}) 21:15:46 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0xfe}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10) 21:15:46 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002e00000000", 0x1c) 21:15:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01600}, {0x6}]}) 21:15:46 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000002f00000000", 0x1c) 21:15:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x3fa6}, {0x6, 0x0, 0x0, 0xfffffd2a}]}) [ 1021.823286][ T22] audit: type=1326 audit(1580591746.882:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7924 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01700}, {0x6}]}) 21:15:46 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000003000000000", 0x1c) 21:15:47 executing program 0: r0 = socket(0x5, 0x2, 0x7f) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'ip6gre0\x00', {0x2, 0x4e23, @multicast1}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe7, 0x0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000080)=0x80) r4 = eventfd2(0x9, 0x80003) read$eventfd(r4, &(0x7f00000000c0), 0x8) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d0000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x260) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'team_slave_0\x00', 0x5e}) [ 1021.904281][ T7940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7940 comm=syz-executor.2 [ 1022.625701][ T22] audit: type=1326 audit(1580591747.692:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7924 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 1022.695158][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.2 21:15:47 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01800}, {0x6}]}) 21:15:47 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000004000000000", 0x1c) 21:15:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.opaque\x00', &(0x7f0000000080)='\x00', 0x1, 0x2) 21:15:47 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1100000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:47 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) chmod(&(0x7f0000000240)='./file0/file0\x00', 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000180)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x6, 0xfd, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r1 = add_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="a0b7", 0x2, r1) 21:15:47 executing program 0: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000040), 0x4) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) lseek(r0, 0x4, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:15:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$VT_WAITACTIVE(r0, 0x5607) 21:15:47 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01900}, {0x6}]}) 21:15:47 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000caf00000000", 0x1c) 21:15:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01a00}, {0x6}]}) [ 1022.870325][ T7976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7976 comm=syz-executor.2 [ 1023.666956][ T7991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7991 comm=syz-executor.2 21:15:48 executing program 2: r0 = socket(0x11, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000540)) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0xffffff01) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCCBRK(r2, 0x5428) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xffc1) setsockopt$packet_buf(r9, 0x107, 0x1, &(0x7f00000005c0)="46bbbe33fe06a2170cb8105fddbe317eada8a52888b58d7998126acd3c6205022a122def672cb6c2b4a2287b0c82c3b68ec92d92eb229110069c9853d3c29c3e69c487f4e2fe3632c07a76f999d7088b1ee49288630542ef502206341f25b8098a1ced1952d0f525e7422003df05da9a99a5f591ff1aa99f56fba63e87a8283cb2148c6ee153eac80623f6ad2f7f5d47027066c42aa5e5adf4ad616a88491e822bb387b4dc438d0cf41d175659bf3dd9d7c346ec5b68343beed8ff0529515cb519ea0235d28486ff4b2e0abf49f3e39cdf39c2c1cd83d7bf19e006815f0b68d17a", 0xe1) ioctl$TIOCSIG(r7, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) r11 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_OPENQRY(r11, 0x5600, &(0x7f0000000100)) 21:15:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x2, 0x2}, {0x6, 0x0, 0x0, 0x4}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) 21:15:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x90, r1, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x5}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_REG_RULES={0x24, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x40}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1ff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x1c, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x20}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x41) getrandom(&(0x7f0000003340)=""/4101, 0x1005, 0x1) 21:15:48 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1200000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xb01b00}, {0x6}]}) 21:15:48 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000ec000000000", 0x1c) 21:15:48 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000d200000000", 0x1c) 21:15:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x80}, {0x6}]}) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x8440, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 21:15:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x2004, 0x6, 0x9}}, 0x28) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/31, 0x1f) r1 = socket$packet(0x11, 0x2, 0x300) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) dup3(r2, r0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x101) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000000c0)={{r4}, 0x2, 0x8, 0x101}) 21:15:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00000}, {0x6}]}) 21:15:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/174, 0xae) 21:15:48 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000004003000000", 0x1c) 21:15:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r3, r3, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, r3) 21:15:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00100}, {0x6}]}) 21:15:49 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1500000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x14080, 0x0) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r1, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x30000045) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe7, 0x0) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x20010, r2, 0xffffffffffffffcb) 21:15:49 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000340000000", 0x1c) 21:15:49 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[@ANYRES64=r3], 0x8) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r5 = socket(0x100000000037, 0x2, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r6}) r7 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r8, 0x40045436, 0x34) ioctl(r7, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00200}, {0x6}]}) 21:15:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0xe, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x0, 0x5}, {0x6}]}) 21:15:49 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@local, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) ioctl$EVIOCSABS3F(r8, 0x401845ff, &(0x7f0000000100)={0x0, 0x3ff, 0x7ff, 0x8, 0x800, 0x4}) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:49 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r3, r3, 0x0) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1000, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000140)={0x90, 0x0, 0x2, {0x3, 0x2, 0x8, 0x3, 0x8a65, 0x101, {0x6, 0x7ff, 0xfffffffffffff000, 0x7, 0x1ff, 0x6b, 0x7, 0x2, 0xce, 0xfff, 0x1, r3, r4, 0x7}}}, 0x90) 21:15:49 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000010000", 0x1c) 21:15:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) socketpair(0x25, 0x3, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000040)=""/109, &(0x7f00000000c0)=0x6d) 21:15:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00300}, {0x6}]}) 21:15:49 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000020000", 0x1c) 21:15:49 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1600000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x60, 0x3, 0x3, 0x801, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x8}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x6}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffa, 0x800}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0xed}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x60}}, 0x4004) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000280)=0x6, 0x4) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="44000000020205000f0006006e657462696f732d6e730000100001800c000280050001000600000008000540000000010800054080000001ad47625a7c9074545f1698f829eac9ee13c4cc5064d2e6c32f961423d2059ac10e0426031bb8a1005a920742212303cfac1f4663d22b98cba4f955a02f5b43ac2a0300000000000000d6a53cd56fbbde4171c2ebba655b3c4f6188dd10e76be838b6c15095939e3dcd5d56a3283915bcc6ea544268d72d62c4280187cfac"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x8088) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x1, 0x4}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x3257004ca9e39bfc, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x1, 0x0, 0x6, 0x401}, 0xc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="7961ce936e30d7c42924a80cbdd6ab8f", 0x10) [ 1024.833707][ T8065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8065 comm=syz-executor.2 21:15:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00400}, {0x6}]}) 21:15:50 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000030000", 0x1c) [ 1024.910022][ T22] audit: type=1326 audit(1580591749.972:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8071 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:50 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) [ 1025.636588][ T8092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8092 comm=syz-executor.2 [ 1025.711138][ T22] audit: type=1326 audit(1580591750.772:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8071 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x96a, 0x5, 0x9, 0x1}, {0xcf67, 0x81, 0x40, 0xd6d}, {0x9ba8, 0x3, 0x7, 0x4}, {0x3ff, 0x40, 0x2, 0x8}]}) 21:15:50 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000040000", 0x1c) 21:15:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00500}, {0x6}]}) 21:15:50 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000002c0)="cd", 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000080)=""/79, 0x4f) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000140)='[\\\x00', &(0x7f0000000180)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x60, r2, 0x400, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0xc1}, 0x44) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020026bd600800000000000000009375a7802aa708000600ffffffff0808"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20000c0) 21:15:50 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x1f00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000280)={0x28, 0x0, 0x0, @local}, 0x10, 0x80800) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) write$binfmt_misc(r7, &(0x7f00000008c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRESOCT=r3], 0x1f) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000080)={0x10f, 0xc, &(0x7f0000001180)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r8 = socket(0x100000000011, 0x2, 0x0) ioctl$TCGETS2(r8, 0x802c542a, &(0x7f0000000040)) bind(r8, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r9}) r10 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r12 = socket$inet_udp(0x2, 0x2, 0x0) close(r12) splice(r11, 0x0, r12, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r11, 0x40045436, 0x34) ioctl(r10, 0x8916, &(0x7f0000000000)) r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r14, 0x4000000000000, 0x40, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x260) bind(r14, &(0x7f0000000700)=@sco, 0x80) setsockopt$IPT_SO_SET_REPLACE(r13, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r15 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r15, 0x4000000000000, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x260) setsockopt$inet_group_source_req(r15, 0x0, 0x2b, &(0x7f00000005c0)={0xfffffff9, {{0x2, 0x4e22, @rand_addr=0x200}}, {{0x2, 0x4e21, @multicast1}}}, 0x108) 21:15:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0x98, 0x1, 0x1, 0x201, 0x0, 0x0, {0x2, 0x0, 0x5}, [@CTA_TUPLE_REPLY={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @broadcast}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xffff501a}, @CTA_LABELS_MASK={0x14, 0x17, [0x5, 0x9, 0x1, 0x29]}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0xa, 0x1, 'H.245\x00'}}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}]}, 0x98}, 0x1, 0x0, 0x0, 0x140}, 0x44041) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r7, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00600}, {0x6}]}) 21:15:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x2}, {0x8}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000)=0x2, 0x4) 21:15:50 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x28, 0x3, 0x0, {0x5, 0x7, 0x0, 'TCPMSS\x00'}}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) getsockname(r1, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000180)=0x80) 21:15:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000001c0)}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x3e}, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) socket$inet6_udplite(0xa, 0x2, 0x88) 21:15:50 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000050000", 0x1c) 21:15:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00700}, {0x6}]}) 21:15:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000000)) [ 1025.920330][ T8125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8125 comm=syz-executor.2 21:15:51 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2000000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fcntl$addseals(r0, 0x409, 0x4) 21:15:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc00800}, {0x6}]}) 21:15:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) [ 1026.742894][ T8148] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8148 comm=syz-executor.2 21:15:51 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) socket(0x35, 0x6, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$sock_SIOCBRDELBR(r8, 0x89a1, &(0x7f0000000100)='xfrm0\x00') r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r7, 0x0, r9, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r7, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x3f, 0x2, 0x9550}) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d0000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x260) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:51 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2200000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:51 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000060000", 0x1c) 21:15:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00000}, {0x6}]}) 21:15:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000000)={0x3, 0x7f, 0x81, 0x81}) 21:15:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x20, 0x7bffffff}, {0x5c, 0x0, 0xfd}, {0x6, 0x17}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) recvmsg(r0, &(0x7f0000001600)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/208, 0xd0}, {&(0x7f0000001200)=""/212, 0xd4}, {&(0x7f0000001300)=""/140, 0x8c}, {&(0x7f00000013c0)=""/87, 0x57}, {&(0x7f0000001440)=""/213, 0xd5}], 0x6, &(0x7f00000015c0)=""/10, 0xa}, 0x20) fcntl$setpipe(r1, 0x407, 0x1000) 21:15:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00100}, {0x6}]}) 21:15:51 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000070000", 0x1c) [ 1026.824960][ T22] audit: type=1326 audit(1580591751.892:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8153 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x7bff0000 21:15:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00200}, {0x6}]}) [ 1026.906332][ T8169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8169 comm=syz-executor.2 21:15:52 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000080000", 0x1c) 21:15:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00300}, {0x6}]}) 21:15:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00400}, {0x6}]}) [ 1027.625733][ T22] audit: type=1326 audit(1580591752.692:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8153 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x7bff0000 [ 1027.704454][ T8186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8186 comm=syz-executor.2 21:15:52 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$nl_route(r7, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x894b73305784471c}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@ipv4_getaddr={0x20, 0x16, 0x100, 0x70bd2a, 0x25dfdbfe, {0x2, 0x18, 0x173, 0xfe, r4}, [@IFA_ADDRESS={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x20}, 0x1, 0x0, 0x0, 0x2004180d}, 0x20048010) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r6, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000040)={0x32, 0x2, 0x400, 0x1, 0x1f}) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:52 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000090000", 0x1c) 21:15:52 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2401000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00500}, {0x6}]}) 21:15:52 executing program 5: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x2, 0x9, 0x401, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0xe}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00600}, {0x6}]}) 21:15:53 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000000a0000", 0x1c) 21:15:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x3, 0x7}, {0x5c}, {0x6}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)='trusted.overlay.opaque\x00'], &(0x7f0000000280)=[&(0x7f0000000180)='$\x00', &(0x7f0000000200)='y\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00']) 21:15:53 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000000b0000", 0x1c) 21:15:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00700}, {0x6}]}) [ 1027.936393][ T8201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8201 comm=syz-executor.2 [ 1027.954266][ T22] audit: type=1326 audit(1580591753.012:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8202 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:53 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2500000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:53 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000000c0000", 0x1c) [ 1028.716358][ T8211] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8211 comm=syz-executor.2 21:15:53 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000000d0000", 0x1c) 21:15:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00800}, {0x6}]}) 21:15:53 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2e00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000001040), 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r7, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x86, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x440, 0x180) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0, 0xf00}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="d207000000307b3a1387d18a39a2fd90bcfb"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000700)={0xec, r6, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@nsim={{0x0, 0x1, 'netdevsim\x00'}, {0x0, 0x2, {'netdevsim', 0x0}}}, @nsim={{0x0, 0x1, 'netdevsim\x00'}, {0x0, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x90}}, 0x4000) r7 = getpid() write$P9_RATTACH(r2, &(0x7f0000000280)={0x14, 0x69, 0x1, {0x10, 0x0, 0x5}}, 0x14) sched_setattr(r7, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs$namespace(r7, &(0x7f00000000c0)='ns/net\x00') pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xffc1) r10 = socket(0x10, 0x3, 0x0) write(r10, &(0x7f0000000000)="2400000052001f0014f9f407000904000a00071008000100ffffffff0800000000000000", 0x24) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x4000, 0x0) r12 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000380)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r11, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r12, 0x100, 0x7ec6, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8010) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r12, 0x800, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x4040050) sendmsg$NET_DM_CMD_START(r9, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r12, 0x300, 0x70bd27, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}}, 0x20040000) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="88000000", @ANYRES16=r6, @ANYBLOB="000226bd7000ffdbdf2525000000080001007063690011000200303030303a30303a040000000000000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c00020000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r8, @ANYBLOB="8b8da9ce34329698c41859766ec0eb4023b7ac6d98e5b2abfe020ba4d219583479b350053e7baa2bec94d135c14a3fc167d527fef54c2ca55e3bb367"], 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) read$eventfd(r1, &(0x7f0000000040), 0x8) [ 1028.754840][ T22] audit: type=1326 audit(1580591753.822:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8202 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x3, 0x3, 0x5, 0x7fffffff}, {0x7, 0x1, 0x7, 0x2}, {0x40, 0x0, 0x0, 0x2}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000080)=""/46, &(0x7f00000000c0)=0x2e) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) 21:15:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00900}, {0x6}]}) 21:15:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe7, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x4, 0x4) [ 1028.858855][ T8229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8229 comm=syz-executor.0 21:15:53 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000000e0000", 0x1c) 21:15:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00a00}, {0x6}]}) 21:15:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0xffffffff00000000) 21:15:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x3, 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000000)) 21:15:54 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000000f0000", 0x1c) [ 1028.900303][ T8248] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8248 comm=syz-executor.2 [ 1028.931636][ T8246] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8246 comm=syz-executor.0 21:15:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00b00}, {0x6}]}) 21:15:54 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4000000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$BLKSECDISCARD(r8, 0x127d, &(0x7f0000000040)=0x6) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)) 21:15:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00c00}, {0x6}]}) 21:15:54 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000100000", 0x1c) 21:15:54 executing program 5: socketpair(0x9, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) process_vm_readv(r4, &(0x7f0000000980)=[{&(0x7f0000000580)=""/101, 0x65}, {&(0x7f00000002c0)=""/63, 0x3f}, {&(0x7f0000000600)=""/200, 0xc8}, {&(0x7f0000000700)=""/179, 0xb3}, {&(0x7f00000007c0)=""/221, 0xdd}, {&(0x7f00000008c0)=""/162, 0xa2}], 0x6, &(0x7f0000000d80)=[{&(0x7f0000000a00)=""/84, 0x54}, {&(0x7f0000000a80)=""/172, 0xac}, {&(0x7f0000000b40)=""/204, 0xcc}, {&(0x7f0000000c40)=""/82, 0x52}, {&(0x7f0000000cc0)=""/188, 0xbc}], 0x5, 0x0) setresuid(r5, r5, 0x0) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000180)="60f4c95d44bd57faa740e2b00b1a2f199c0438dc", 0x14, 0x1}, {&(0x7f0000000200)="e51104ca592e9e20c217518a56b16d4b0f204d3ebebbae10a267a5", 0x1b, 0x9}, {&(0x7f0000000240)="36bd37b423c32d7ba953dd146be99e80c30e2fbb676518a1ab9276f5d080b673858bfce1de3894cf96c7ac84fbe44e319d93a6c32e225a0530bc3bb1408bdcd0f40212813d154f4c1b032b55acf3fb35e32c0b5b1f323104e7d61a0cbb4bfc1fdf8bce7218", 0x65, 0x1}, {&(0x7f0000000340)="839fd82bd7e372bbb37bda6a0a51cd6051601e3653af2584b4109a773b53132dd1288cbb6bac5434ada3bc4d921fabe1072d864b4238eb61bb9f837fd9bea4272c84f46c7b7f", 0x46, 0x8}], 0x20020, &(0x7f0000000e00)=ANY=[@ANYBLOB='codepage=950,iocharset=ascii,shortname=winnt,func=PATH_CHECK,fsname=mime_type.*trusted*!!vmnet1procselinuxselinux@ppp1system&lo+selinux\\,permit_directio,smackfstransmute=,smackfsdef=.bdevvmnet0,dont_measure,fowner>', @ANYRESDEC=r2, @ANYBLOB=',fsname=@,fowner>', @ANYRESDEC=r5, @ANYBLOB="2c013802006ade180b06a5c099733f889ef5028b9a408527db83dd6ca2fd08be3367b84cd05c9a8fbd08486774b738f0de6ffed9772206be1f238edb90a06f4d25d884e2be7b3b4ee2e988077be653ae07bad77f8ca12571343a1f356e71ee7d347e6ac79ce5ba9b7068517e40d7ddc92d4a60e78dbf404af250a1b9968537bb13d1726a046faf12cea439185cebda565da4e2de38c701d64d3b1695e0a1dcb07173c5845ab5d30ab6af026142837ff4c5bc17e6b0170cf1320d14a48dea1c4b9bd70ab665c9da54e3b0a34a08acee9ed069ed15d518daba9ad29c42cd"]) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) setgid(r6) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) 21:15:54 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4000080000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00d00}, {0x6}]}) 21:15:54 executing program 0: prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0xb) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:15:54 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000110000", 0x1c) 21:15:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00e00}, {0x6}]}) 21:15:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000480)={0x3, 0x1, 0x2, 0x12, 0x9c, &(0x7f0000000080)}) 21:15:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x40, 0x4, 0x1f, 0x7}, {0x200, 0x7f, 0x5, 0x4}, {0x100, 0x7f, 0x3f, 0x8ee}]}) [ 1030.666314][ T8310] selinux_nlmsg_perm: 2 callbacks suppressed [ 1030.666325][ T8310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8310 comm=syz-executor.2 21:15:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 21:15:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd00f00}, {0x6}]}) 21:15:55 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000120000", 0x1c) 21:15:55 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4800000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0, 0xf00}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x14, r3, 0xc91add0bf88807dd, 0x0, 0x0, {0x2f}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="1960f2d996a0409fc61a5cc54e08b735600ae843125c57b49cdc681b8bd7982f46341b49be7427a800df759e16670c10bbb907a15f5d3df916759060bd1ed2d8ff296019b890751fbae2515ac32be8fc8b", @ANYRES16=r3, @ANYBLOB="10002dbd7000fedbdf2501000000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x90}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r3, 0x20, 0x70bd28, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000044}, 0x48005) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000200)) 21:15:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01000}, {0x6}]}) 21:15:56 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0xb8, 0x0, 0xb8, 0xb8, 0xb8, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@broadcast, @multicast1, 0x0, 0xff, 'xfrm0\x00', 'macvlan1\x00', {}, {}, 0x2f, 0x3}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x3, 0x5, 0x80000001, 'snmp\x00', {0x5}}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) connect(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2, 0x0, {0xa, 0x4e23, 0x7, @mcast2, 0x3}}}, 0x80) 21:15:56 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000130000", 0x1c) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01100}, {0x6}]}) 21:15:56 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x1cc) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) splice(r2, 0x0, r4, 0x0, 0x6, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01200}, {0x6}]}) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01300}, {0x6}]}) 21:15:56 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000140000", 0x1c) 21:15:56 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x4c00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:56 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xad, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="265f6ea5fb46722a1c75c208b21af7f2c16e9b308105baab9a89e8ad080ae492798aa41587141693610b947fa6ee182eddbc7c76925f59f03ae9c538541e9c48eea9582d6f26c61e0b0d69397f4b1482d85941a6d1527e181bcaa624043317504c54299170e0b53041feff39adc6543109964d0ede7c410df9aa2045ed5e16411ea2a96992464c8fbcf5e1cb73aaaefd1f1e67b678b158ec5178f4cca80cc0a12e4744", &(0x7f0000000100)=""/77}, 0x20) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe7, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x7, 0x3, 0x1000}, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01400}, {0x6}]}) 21:15:56 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000ed0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d0000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x260) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r10 = fcntl$getown(r9, 0x9) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r11, &(0x7f0000000140)=ANY=[], 0xffc1) statx(r11, &(0x7f0000000880)='./file0\x00', 0x100, 0x10, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = gettid() r15 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r16, r16, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r17, 0x0) sendmsg$unix(r4, &(0x7f0000000b00)={&(0x7f00000006c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000740)="4e977bda2c29fc482df5cda8ca347b2f8a11bbb14696910d2e2d0b7e6ebfa8f3731e2327fade460c4b8ccf5b0c05c64a43da73b3b096d89bab9d3ab709a32b77658e36bec48597a6d401d9aa1710e27db14a96d1a97137a859358cb6e277fded7bb195519c1ec58905d63444792c4b126dd9e7ba4faa79f2be18d0662c1f1116d4eb0cdf4bbeda1bc2f1b4fb4a725994d5168350a86231e9c15e6c847027c5a13496fca804d1e84a61eb9e0553198e8cc2719971", 0xb4}, {&(0x7f0000000800)="5fb9eba78a1b62a95595a8d4f3c4789c7c23ea", 0x13}], 0x2, &(0x7f0000000a40)=[@rights={{0x24, 0x1, 0x1, [r0, r5, 0xffffffffffffffff, r6, r7]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r1, r8]}}, @cred={{0x1c, 0x1, 0x2, {r10, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, r17}}}], 0x88, 0x4}, 0x4) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r18}) r19 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r21 = socket$inet_udp(0x2, 0x2, 0x0) close(r21) r22 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) sendmsg$IPSET_CMD_DEL(r22, &(0x7f0000000680)={&(0x7f0000000100), 0xc, &(0x7f0000000540)={&(0x7f00000005c0)={0xb4, 0xa, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x75cb}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x9fd0}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_vlan\x00'}]}, @IPSET_ATTR_DATA={0x64, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x100}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_virt_wifi\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x9}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x3}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xffffffff}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4050}, 0x8080) splice(r20, 0x0, r21, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r20, 0x40045436, 0x34) ioctl(r19, 0x8916, &(0x7f0000000000)) r23 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r23, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r23, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:56 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000150000", 0x1c) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01500}, {0x6}]}) 21:15:56 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000160000", 0x1c) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01600}, {0x6}]}) 21:15:56 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6000000000000000}}, {@max_batch_time={'max_batch_time'}}]}) [ 1031.151291][ T8365] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8365 comm=syz-executor.2 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01700}, {0x6}]}) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01800}, {0x6}]}) 21:15:56 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000170000", 0x1c) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01900}, {0x6}]}) 21:15:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01a00}, {0x6}]}) 21:15:56 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000180000", 0x1c) 21:15:57 executing program 2: r0 = socket(0x10, 0x3, 0x3) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) [ 1031.946091][ T8367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8367 comm=syz-executor.2 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xd01b00}, {0x6}]}) 21:15:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe7, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000100)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xffc1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r5, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0, 0xf00}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)={0x90, r6, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x90}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r6, 0x139, 0x70bd27, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4090}, 0x20000000) r7 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$TIOCEXCL(r8, 0x540c) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x20, r10, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_MAC={0xa, 0x4, @broadcast}]}, 0x20}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x314) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, 0x0, 0x0) sendmsg$nl_route(r13, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="300000001000000300000000feffffff00000000", @ANYRES32=0x0, @ANYBLOB="180802000000000008002900646900000800230009000000c650eaf4d12e7f702cb92d375175fa0bb44eb8c4050af94bd47ac1efee9f31f00c19fca1b4724c1be6b0f1aaec5dbcd5775bda3b3fbc0700000000000000a1968a70523873a8ebf423bab065f90b6a1c9970e8fc5d87f2b213559fe69147fff7a171250b4d0b7de1ea474a838c3b3e15f66d70584b337f26"], 0x30}}, 0x0) r14 = socket(0x10, 0x2, 0x0) r15 = gettid() sendmsg$netlink(r14, &(0x7f0000000300)={0x0, 0xffffffffffffff6d, &(0x7f0000000140)=[{&(0x7f0000000800)=ANY=[@ANYBLOB="10000000000000000000831bf313000019778b015cd8e49ff7d681ad07ffc696718bbfdafc2870ac3f024200a9b48ffcc2e9778d230aa3825a92846a6823b772bf9847eddd2f6b10ace18b4ecb783b56c84a8265965166f781497006aee543fa4cb42453dbd1c00cd6408780186063b35ea1f7bf8f032ddc9d65bfb152d0e721fbf755929b31ff5ec606b7e7fdb0939a156d8dee00e12b7e1f49cb8452ddc4d6c73107c968"], 0x10}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r15}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r14, 0x0, 0x24, &(0x7f0000000600)={@multicast2, @multicast1, 0x0}, &(0x7f0000000640)=0xc) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x314) sendmsg$nl_route(r17, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r19}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000680)={'macsec0\x00', r19}) sendmsg$NL80211_CMD_GET_WIPHY(r8, &(0x7f00000007c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0x38, r10, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r16}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r20}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x46f111f2, 0x1}}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4048890) sendmsg$NL80211_CMD_GET_KEY(r3, &(0x7f0000000600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x8c, r10, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "d94a76736cf86715f205ee2fe8"}, @NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0x2f}}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "178876657b"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "e76dcdd3d1"}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_SEQ={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x480c1}, 0x40000) fcntl$setstatus(r0, 0x4, 0x2c00) 21:15:57 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6800000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000000)={0x9, 0xdc, 0x1, 0x9}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6f}, {0x6, 0x0, 0x0, 0x5fed}]}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @empty}, 0x200, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7ff, 0x100, 0xfff}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@bridge_delneigh={0x1c, 0x11, 0xf07}, 0x1c}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000440)='NLBL_UNLBL\x00') add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, r3, 0x200, 0x70bd28, 0x25dfdffb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x1b}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x4008080) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x4ffe7, 0x0) socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000700)='vxcan1\x00', 0x10) close(r8) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="030b0000000000000000130000001400038008000200010000000800030001040600"], 0x28}}, 0x0) sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)={0x70, r6, 0x30a, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x48, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb49}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6e4f042c}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc24c}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40001}, 0x5000) sendmsg$NLBL_UNLABEL_C_STATICLIST(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000000) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fcntl$F_GET_RW_HINT(r9, 0x40b, &(0x7f0000000740)) 21:15:57 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000190000", 0x1c) 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00000}, {0x6}]}) 21:15:57 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000001a0000", 0x1c) 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00100}, {0x6}]}) [ 1032.049392][ T8398] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8398 comm=syz-executor.0 [ 1032.068121][ T8393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8393 comm=syz-executor.5 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00200}, {0x6}]}) [ 1032.121611][ T8412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8412 comm=syz-executor.0 21:15:57 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000001b0000", 0x1c) 21:15:57 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe7, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000000)=0xffffffff) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffefff}, {0x6c, 0x0, 0xd9}, {0x1, 0x4}]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'syzkaller1\x00', 0x4}, 0x18) 21:15:57 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r1, 0x0, 0x0, 0x2162, 0x0, 0x22) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:57 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6c00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) [ 1032.194514][ T8393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8393 comm=syz-executor.5 21:15:57 executing program 5: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=""/187, &(0x7f00000000c0)=0xbb) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00300}, {0x6}]}) 21:15:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r1 = dup(r0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x400, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 21:15:57 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000001c0000", 0x1c) [ 1032.252153][ T8439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8439 comm=syz-executor.2 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00400}, {0x6}]}) 21:15:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) statx(r1, &(0x7f0000000040)='./file0\x00', 0x1000, 0x10, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5b, 0x7d, 0x1, {{0x0, 0x46, 0x200, 0x3, {0x80, 0x3, 0x4}, 0x2080000, 0x1, 0x3, 0x8, 0x0, '', 0xe, '\'ppp1$trusted)', 0x3, 'GPL', 0x2, '\xd7%'}, 0x0, '', r2, r3, 0xee00}}, 0x5b) 21:15:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="ae4d93e12fbcc01e05672a668801d0e0", 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="4088e2ff2d88448aa0159312", @ANYRES32=r3, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r5, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r4, r5, &(0x7f00000001c0), 0x80e45) gettid() getpeername$unix(r4, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000003a40)=ANY=[@ANYBLOB="c01b0000", @ANYRES16=r0, @ANYBLOB="000427bd7000fddbdf250f0000000500a3000100000008000300", @ANYRES32=r3, @ANYBLOB="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"], 0x1bc0}, 0x1, 0x0, 0x0, 0x80c0}, 0x24008080) [ 1032.338093][ T8453] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8453 comm=syz-executor.2 21:15:57 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x6fe09e347e770000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00500}, {0x6}]}) 21:15:57 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000240)={0x2, @empty, 0x4e24, 0x0, 'wlc\x00', 0x2, 0x80000, 0x3}, 0x2c) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="30f1ffff0f00010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000800130031f10804d413970f5b8dc4a7679c3eaf7c92b50d7a285b4ade1e84b68c8dc69400b1b64a763dc7eb16b04e6c616e24d426b8f197f37fcd8f09b5c7e7ea0fff6abb7d6b38f6cda8c40000000000000028b06dba483917e9ff329ac29fd9632314cb9f0392b264a5f369e799c909514c8416102f56f8ded1e965f3cd0b7804ac61979f98961b723174d3db9d476b726fce00acbf72faf14745a1beadeff9e3e3e8f6fcdc4bce4bddbdf39d92576b1e0a7467dbd3", @ANYRES32=r3, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@dev={0xac, 0x14, 0x14, 0x27}, @in=@empty, 0x4e21, 0x5, 0x4e20, 0xf2e, 0xa, 0x80, 0x80, 0x87, r3, r4}, {0x6, 0x8ed, 0x0, 0x200, 0x800, 0x0, 0x4, 0x41}, {0x4, 0x7fffffff, 0x381, 0x9}, 0x8001, 0x6e6bb0, 0x3, 0x1, 0x1, 0x2}, {{@in6=@ipv4={[], [], @broadcast}, 0x4d4, 0xe6}, 0xa, @in=@empty, 0x3506, 0x1, 0x3, 0x9, 0x4, 0x4, 0x401}}, 0xe8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 1032.410591][ T8466] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 21:15:57 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:57 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000001d0000", 0x1c) 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00600}, {0x6}]}) 21:15:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c, 0x0, 0x4}, {0x6}]}) [ 1032.458382][ T8473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=8473 comm=syz-executor.0 [ 1032.484243][ T8466] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00700}, {0x6}]}) 21:15:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2882, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="30000000210000042cbd7000000000000a800005060000000800000014000200c56f7307be872deef1"], 0x30}, 0x1, 0x0, 0x0, 0x4880}, 0x800) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) r5 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206026100a843090a26234d25000700080002000800000d0000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000540)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@empty, @in=@loopback, 0x4e21, 0x1, 0x4e20, 0x2, 0x2, 0x80, 0x24ad9d28e4657d03, 0x32, r4, r6}, {0x4, 0x0, 0xff, 0x6, 0x6, 0x0, 0x8c83, 0x100}, {0x1, 0x8, 0xdf2, 0x6}, 0x4, 0x6e6bb8, 0x0, 0x0, 0x2, 0x1}, {{@in6=@loopback, 0x4d2, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x22}, 0x3504, 0x3, 0x1, 0x1, 0x4, 0x3, 0xff}}, 0xe8) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1_virt_wifi\x00') 21:15:57 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000001e0000", 0x1c) 21:15:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) accept$inet(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)=0x8) restart_syscall() 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xe00800}, {0x6}]}) 21:15:57 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x7400000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$TIOCEXCL(r2, 0x540c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x20, r4, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_MAC={0xa, 0x4, @broadcast}]}, 0x20}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x314) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = socket(0x10, 0x2, 0x0) r9 = gettid() sendmsg$netlink(r8, &(0x7f0000000300)={0x0, 0xffffffffffffff6d, &(0x7f0000000140)=[{&(0x7f00000006c0)=ANY=[@ANYBLOB="10000000000000000000831bf3130000"], 0x10}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r9}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f0000000600)={@multicast2, @multicast1, 0x0}, &(0x7f0000000640)=0xc) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x314) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r13}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000680)={'macsec0\x00', r13}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000007c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0x38, r4, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x46f111f2, 0x1}}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4048890) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x58, r4, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY={0x44, 0x50, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_SEQ={0x4}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "0c1ea211a91e735afec9c6455b"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "91fca7509e"}, @NL80211_KEY_SEQ={0x5, 0x4, '='}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000060}, 0x8000050) [ 1032.581379][ T8492] netlink: 'syz-executor.0': attribute type 7 has an invalid length. [ 1032.617043][ T8492] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 21:15:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00000}, {0x6}]}) 21:15:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000002000000030000000002f3ffc800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d0000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000004feffffff00000000"], 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:58 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000001f0000", 0x1c) 21:15:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x104, r1, 0x100, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xf07}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x48, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xee6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa6e3}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe86}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 21:15:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00100}, {0x6}]}) 21:15:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0xffffffff00000001) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fcntl$dupfd(r0, 0x406, r2) 21:15:58 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x7a00000000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x4, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x5}, {0x6}, {0x9, 0x2, 0xd4, 0xff}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) 21:15:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00200}, {0x6}]}) 21:15:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x9, 0x81, 0x14, 0xfff}, {0xfffe, 0x1, 0x9, 0x3}, {0x2, 0x8, 0x26, 0x7}, {0x8001, 0x4a, 0x4, 0x10000}]}) r2 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000000c0)={@loopback, @dev, 0x0}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000140)={'batadv0\x00', r3}) 21:15:58 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000200000", 0x1c) 21:15:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00300}, {0x6}]}) [ 1033.485552][ T22] audit: type=1326 audit(1580591758.552:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8535 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 1034.287824][ T22] audit: type=1326 audit(1580591759.352:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8535 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:15:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00400}, {0x6}]}) 21:15:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000210000", 0x1c) 21:15:59 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x8cffffff00000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206026100a843090a26234d25000700080002000800000d0000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_bond\x00', 0x4}, 0x18) 21:15:59 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:15:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00500}, {0x6}]}) [ 1034.398580][ T8562] netlink: 'syz-executor.0': attribute type 7 has an invalid length. [ 1034.443673][ T8562] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 21:15:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00600}, {0x6}]}) 21:15:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000220000", 0x1c) 21:15:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00700}, {0x6}]}) [ 1034.493215][ T8562] netlink: 'syz-executor.0': attribute type 7 has an invalid length. [ 1034.521935][ T8562] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 21:15:59 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xf6ffffff00000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00800}, {0x6}]}) 21:15:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000230000", 0x1c) 21:15:59 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r8, 0x0) write$P9_RGETATTR(r7, &(0x7f00000005c0)={0xa0, 0x19, 0x2, {0x800, {0x10, 0x2, 0x646}, 0x14, 0xee00, r8, 0xffffffffffffff81, 0xfffffffffffffffb, 0x7fffffff, 0x100000000, 0xfc62, 0x1, 0x4, 0x8, 0x1f, 0xffffffffffffffbd, 0x9, 0x8, 0x5, 0x7, 0x17}}, 0xa0) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r6, 0x0, r9, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:15:59 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, &(0x7f0000000040)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x8, 0x9, 0x6, 0x4, 0xc, "8b14b63686ef4a2c"}) 21:15:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00900}, {0x6}]}) 21:15:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00a00}, {0x6}]}) 21:15:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000240000", 0x1c) 21:15:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x1}]}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000040)={0x1f, 0x1, "08bebb0df6c46312a412232e34e926ef97fb8fdd607514277b94933f0b917d33fb38fc251cb8533d1b4ba1233c73d13f1197f1764e240b487a28bb34c984fba6c62e532e2454a843a50f0b9dfcbc0c3e324b269c1f90381589b35ade60b1384f53fdb590b8b024a5d438ba0dcd9becde140902b00f67105a4118b21b3e491761fff1ec56ed28513f7a78e9b69daf46fba4701c052639a9c6a2fec67bfb9a553d9e82a30cd1269512206e2e2f2f66863ad329071acf8dc934fef5fca96b6030750874cfa6be26a5f798a9b2b9d82ec08bf9b3f9ea27d7c3c0c563f59389e08d70106ee4a03328e79b39883cd081eefbdadba302a2f01bb5c6f7f03f1b0dcdbbcc"}) 21:15:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=']eth1cgroup\x00', r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r2, 0x4) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000000)=0x2) 21:15:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x12040, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0x6) 21:15:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000250000", 0x1c) 21:15:59 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xf8f73f0000000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:15:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00b00}, {0x6}]}) 21:16:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00c00}, {0x6}]}) 21:16:00 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xfdfdffff00000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:16:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) getdents64(r0, &(0x7f0000000000)=""/66, 0x42) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe7, 0x0) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f0000000080)) 21:16:00 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000260000", 0x1c) 21:16:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00d00}, {0x6}]}) 21:16:00 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000200)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000240)=""/8) prctl$PR_SET_SECCOMP(0x16, 0xab524b227e57ae76, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0xfffc, 0x0, 0x0, 0x7fffffff}, {0x6c, 0x0, 0x5}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) sendmsg$IPCTNL_MSG_EXP_NEW(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xf4}, 0x1, 0x0, 0x0, 0x8000}, 0x40801) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x204600, 0x0) r5 = creat(&(0x7f0000000400)='./file0\x00', 0x132) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) write$binfmt_misc(r7, &(0x7f00000006c0)=ANY=[@ANYBLOB="cc1cce0acfbae759aecb640a99e07331ed19a40c110f4dd729f27d7bf4aa15cd2785ba3b0f749bcc7bfa60eb806accf87705194dc57e1c202644c3b640f5b7", @ANYRES64=r9, @ANYRES32=r8], 0x4b) r10 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r6, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r10, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x40}}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x21}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40810}, 0x4000001) ioctl$TIOCSBRK(r5, 0x5427) setsockopt$inet6_group_source_req(r4, 0x29, 0x2c, &(0x7f0000000080)={0x2, {{0xa, 0x4e23, 0xfffff001, @rand_addr="04d1ffb45750ab9db9710b3f41d51a8f", 0x9d0}}, {{0xa, 0x4e21, 0xfff, @local, 0x8}}}, 0x108) 21:16:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) 21:16:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00e00}, {0x6}]}) 21:16:00 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x36) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x5, 0x7fffffff}, {0x5c}, {0x0, 0x0, 0x9, 0x2000}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)=0x1) 21:16:00 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000270000", 0x1c) 21:16:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="7261770000000000400000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d0000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x260) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe7, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @multicast1}, &(0x7f0000000600)=0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r7}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r10}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000700)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x48, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0xffffffffffffffff}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x48}}, 0x40005) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r11, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r11, 0x6, 0x21, &(0x7f0000000040)="b42b5d42d93e005f6466f346e56bbd9b", 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'vlan1\x00', 0x1f}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r13 = socket$inet_udp(0x2, 0x2, 0x0) close(r13) r14 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r14, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$sock_inet_SIOCGIFNETMASK(r14, 0x891b, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x9, @local}}) splice(r12, 0x0, r13, 0x0, 0x4ffe7, 0x0) ioctl$TIOCGLCKTRMIOS(r12, 0x5456, &(0x7f0000000080)={0x4, 0x9, 0x0, 0xfffffff8, 0xf, "cc0fa21c68e69b711ae6cc1d694e775577d325"}) 21:16:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf00f00}, {0x6}]}) 21:16:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0xff}]}) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:16:00 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xffefffff00000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:16:00 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000280000", 0x1c) 21:16:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x6, 0x3f, 0xf, 0xff}, {0x1ff, 0x2, 0x4, 0x7}]}) 21:16:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01000}, {0x6}]}) 21:16:01 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000290000", 0x1c) 21:16:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) ptrace$getregset(0x4204, r0, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/85, 0x55}) 21:16:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01100}, {0x6}]}) 21:16:01 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 21:16:01 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000002a0000", 0x1c) 21:16:01 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r5 = socket(0x100000000011, 0x2, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r6}) r7 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$inet_udp(0x2, 0x2, 0x0) close(r13) splice(r11, 0x0, r13, 0x0, 0x4ffe7, 0x0) getsockopt$TIPC_IMPORTANCE(r11, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000100)=0x4) splice(r8, 0x0, r10, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r8, 0x40045436, 0x34) r14 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002280)='/proc/self/attr/fscreate\x00', 0x2, 0x0) r15 = openat$vsock(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/vsock\x00', 0x20000, 0x0) r16 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r16, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r18 = socket$inet_udp(0x2, 0x2, 0x0) close(r18) splice(r17, 0x0, r18, 0x0, 0x4ffe7, 0x0) ioctl$TIOCGSID(r17, 0x5429, &(0x7f0000002300)=0x0) r20 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r21, r21, 0x0) r22 = getegid() r23 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002340)='/dev/ttyS3\x00', 0x166101, 0x0) r24 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r24, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r25 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r25, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r26 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r26, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000002380)=0x0) r28 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r28, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fstat(r28, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r30 = getgid() r31 = socket$inet6_udplite(0xa, 0x2, 0x88) r32 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r32, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r33 = getpid() sched_setattr(r33, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r35 = getpid() sched_setattr(r35, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r36 = getpid() sched_setattr(r36, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) clone3(&(0x7f0000002700)={0x200000, &(0x7f0000002440), &(0x7f0000002480)=0x0, &(0x7f00000024c0), {0x11}, &(0x7f0000002500)=""/214, 0xd6, &(0x7f0000002600)=""/176, &(0x7f00000026c0)=[0xffffffffffffffff, r33, r34, r35, 0xffffffffffffffff, 0xffffffffffffffff, r36, 0xffffffffffffffff, 0xffffffffffffffff], 0x9}, 0x50) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r38, &(0x7f0000000140)=ANY=[], 0xffc1) statx(r38, &(0x7f0000002780)='.\x00', 0x4000, 0x20, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r40, 0x0) r41 = openat$cgroup_int(r1, &(0x7f0000003000)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r42 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000003040)='/selinux/validatetrans\x00', 0x1, 0x0) r43 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r43, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r44 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r44, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r45 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r45, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r46 = getpid() sched_setattr(r46, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003080)={{{@in6=@ipv4={[], [], @initdev}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000003180)=0xe8) statx(0xffffffffffffffff, &(0x7f00000031c0)='.\x00', 0x0, 0x20, &(0x7f0000003200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r49 = openat(0xffffffffffffff9c, &(0x7f0000003300)='./file0\x00', 0x440400, 0x0) r50 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004800)={&(0x7f0000003740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x4, [@typedef={0x3, 0x0, 0x0, 0x8, 0x4}, @struct={0xf, 0x6, 0x0, 0x4, 0x0, 0x0, [{0xd, 0x2, 0x6}, {0x2, 0x2, 0x2}, {0xc, 0x0, 0x3}, {0x4, 0x5, 0x3aad}, {0xe, 0x4, 0x7}, {0xd, 0x5, 0x8}]}, @fwd={0x2}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000003800)=""/4096, 0x88, 0x1000, 0x1}, 0x20) r51 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r51, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r52 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r52, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r53 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r53, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r54 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r54, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r55 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004840)=0x0) getsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f0000004880)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r58, 0x0) r59 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r59, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r60 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r60, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r61 = syz_open_dev$binderN(&(0x7f00000049c0)='/dev/binder#\x00', 0x0, 0x6) sendmmsg$unix(r4, &(0x7f0000004ac0)=[{&(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000640)="526d46d9c3f0d00a9e81b0bdb460cce2d97f55d2a2760f71a21e432089d99966fb901af22737acc04da2a8a0301ba1ce47fc2aebf369e7e4abe085a5fc77c49699cdf2108ff43e5df2bf5214fe46c29db1bd982a28080c5498275642eafab387e3e6fa9c10ad158dd2125b1ceccb6dadcf5c4e7134cf1635bd5ee1e8ab42aec17e1c351999b264c5d7e067ffae33882d0d8bb586195473ebbabd358da0921acc4b4fe843ef822955feaa2d5a1e2a4240dc240efd8e3e1c5eb07683bef570e6e55775d2a61b86a4dac5d67236fe511f11de9a8b8d4feeb3f88d5906a5ef26f6802164fed73e84f1fb7fea0ca625d27f7380eee1e910", 0xf5}, {&(0x7f0000000540)="086bccaad98929862ac572710354058f4c105d61b8c5b0549086e92f2d2f0b4280c8a20dea2e2f913573c9db8b697a6b414121cc2e", 0x35}, {&(0x7f0000000740)="3d3b40cc29321cfd970b8264a37b15ba25f99cbee35e624f195da6f723", 0x1d}], 0x3, 0x0, 0x0, 0x90}, {&(0x7f00000007c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000021c0)=[{&(0x7f0000000840)="c5acd255c4a943292b29ac0bab067b18cee911d9d431aa4b481ab56fc37919b8f17badf63c72d5e9b5866e2093c6ee", 0x2f}, {&(0x7f0000000880)="06d0d6cecabb7e26c9ce0f629c89d1247ce3508e7c6397613e4152107ef25460cb9b0491022730f4addecc4b005395df420588ecdd22e37d8810bc3eba31c912c2a9b2096013a23c7f7cf1025ec5b84d2c7fd4cc40a7f84c36b937dcb7e171c40c392e0fdf90690909452ae7cd6219fbf15485da41de9d0587c5c8106de9c9ae43c87b6759392e119eac101f208fff9cc3157e987cd673651e787376bd8aea3d83f3ec275c431e9106cc3e7a16a211f8171030e80b097addb19d2b09609150d157fa12b097ad3a576109", 0xca}, {&(0x7f0000000fc0)="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", 0x1000}, {&(0x7f0000000980)="5fd3cae5bd8a0f92f097a669fe28f93595bb42dd56e4841f27e71d8f69a7f2c43515c32f169ee572a3f4ac8f19a63139be7adb0255725df1b9fc5e5813bdebc79bf1fed1a85fef2579c4e4b4dcf2a755607c57869f36fc555f6bbbbc2285d0790ab464a5ca081159628d4aca265802aafaa4b1be80fcd43e65834e66f278ebb827d48f", 0x83}, {&(0x7f0000000a40)="40e413123174cd55ed75421248ab8c41310da48d48e445691ef0e76e40c0146d81ccea7f3abe2659c11ce445bf1c9e265abdcf9bd60f685309e9fae6224440275dbdadc331edb26e49e7c808d3680a5d94dce26fb78605042709f3da707d7ec3859f62766cae7e0fdf51aef93ea56b820352d61003a1989ae20132602a3eca22bc7431cfb9c5c7b245c59997813520e3d8523f70c1a6b41bf6aea8bc56ea5c13f289899b49701d746e002f7ad6fbe3863f4b4acb3573511e79de60a8561eec297bd02e16a078bf8d4a52e9e94d8b", 0xce}, {&(0x7f0000001fc0)="685e11ad3e3b491b8d6958fa2bb4277bd107638e16cdda78ba8dc039b52a85e62b0b20e49eb6cc2e9ae04b32583944788bd96e59a3f0a2b9355ad3a176440c856d58fddc0c25d4a84b3a06efc770ba3baa2077f5f21c0a30e1f3d36a117465ecef5e08a4dde29f2a4f9326e9dcfd784f93aae2cada92746af001a5e52a86808477097e74b14d6faff0c760db35c088d9dc3ea09a11ae442dcbf32a214f42e907cebc4134ffa803db0873879114c77257edfd6c48", 0xb4}, {&(0x7f0000002080)="ff2dce184ebd7fa1cb5571a9832fec2862fdd535f40e0478e47ac70d937a8cb755325eef7d2cb621e70fb61411c84569c8d31316554ae1e4e4197623d910b3f9b0f2ac89b823f4321820c5cc53c90d5211aa25b4ce0b16a948a5ff047aab66357fb049ac35500f3847a2b925f2f7bdc09fadcf51f04f5410f78a20b7b0fd44e805ed15bc4d88cb9735", 0x89}, {&(0x7f0000000b40)="c76c60dc69552658a54ad63431ff323cb2b8fecd2909c8918d8efd6c109b16db331777ec833b955778341985be4f7da9d2cb36e44924f3", 0x37}, {&(0x7f0000002140)="d8d2b7b517f848bc537d2d91c490f826f9c66597893af241073ae4f103100c6877f2967e6a8685e07acd35143933ea36bcc4b5f14df6ff5b58691fbf4e32a42f3b22302788d47cb07d3272fa13f15d8ee4dc5f7918a296359e36102a06a89eff6b9855c6e97f94997eb3", 0x6a}, {&(0x7f0000000b80)="cf6dfbf03bc14a8522c28fd724", 0xd}], 0xa, &(0x7f00000028c0)=[@rights={{0x20, 0x1, 0x1, [r5, 0xffffffffffffffff, 0xffffffffffffffff, r14]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r15, r16]}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, r22}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r23, r8, r24, r25, r0, r26]}}, @cred={{0x1c, 0x1, 0x2, {r27, r29, r30}}}, @rights={{0x28, 0x1, 0x1, [r31, r3, r10, 0xffffffffffffffff, 0xffffffffffffffff, r32]}}, @cred={{0x1c, 0x1, 0x2, {r37, r39, r40}}}], 0xf8, 0x10}, {&(0x7f00000029c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002ac0)=[{&(0x7f0000002a40)="5dc9255ae8602c3fd9597bca19d9c0b0fb91d5aa2acff4e6e389c898d4982e3f42962b5708dd4a0e", 0x28}, {&(0x7f0000002a80)="3b4fa141f8a592", 0x7}], 0x2, &(0x7f0000002b00), 0x0, 0x2000c040}, {&(0x7f0000002b40)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002f80)=[{&(0x7f0000002bc0)="f54279d75bec202fa3132ae05d6a4d101e4af54d54ac49298332c9f62c4dfef9ce6f4c9e19fc91e7863568354cb031", 0x2f}, {&(0x7f0000002c00)="83148af9addafd862650c00edd7b94aad4ef4e24abacdb50d90e55f9f17d85c837d01703485eac9677f0718c0be25e92a4110d3d4be94efa69b508790e7209a8d834534b264b9acec229b3227b5b49729fc781ec0231f1ff8b1a0f0349bd9e7c6ab25770736d91980fd924", 0x6b}, {&(0x7f0000002c80)="ddf3352e8bd84213681d3efba4240c6365187876da9d25a4a8a8d9b685fca549eab8cf0eaf43ceeb98f4fecdba7d7542c20a0d76210863db0ce535da9721585512aed7c90f64ccbdf642630e9670e80664af2a9b795462d0f6c292cf38b37f46756b075fe91501c65511bd9e4e3c00b9627b1fe3d84c85e1a1f5526d243ed28723", 0x81}, {&(0x7f0000002d40)="99a0051054ea91abfe5b0c42c9aea18141fec3aec6f1362c0e18bc5e5de76ffa4cdc045ec8638ca16920319de260a316", 0x30}, {&(0x7f0000002d80)="3c9f8aa18f2a7cae310bd814f16b092bcb16b897c27e09bdc4d45fabdd613bcd3974d0578f881cfc0102a6ecbe2076667d1613ddd3a81b8f583122243cbef93dd3994dff2441a33e8454695c5d6363b2805b9171d6875823e230b73baa56766ca159030eee28dce10a0189f5e57a03ba1e56741ec0d88e43bde910b656d1ca4f10a040c6edce45678d82b96344a9ef02bd772116959f9944cf97d39554755768450b9e05becd77c811642ed48583da80a2a94f3e5de811742f410741b189b80ae7a9deda5572e76a", 0xc8}, {&(0x7f0000002e80)="a777ebb69794c320fc8ebcc580ca2cb59c4b3bd4a37dab65814cb097e5f2704f0d3dcaede165551604593130c1e1367833ccb56beac8eee025e46b585026e05b38fe0205376c4fc96bfef9788dcc7b0026689eb433affee0aec30f7d028b3421fec4daf322536fdc05a440b98f856d86ba77b7ce5063033c639de1869724030611736069a51924725b551e3320c44c8c397461abc25f16d381e263923a8175d5c949e7a260ba9cc2b91668364eebb2dabd4831a14e55ec199ed1e354e98c2f89d83743d3fb41102c5bd6f118030509ec6bbab51d5c935587fa3aef1f1b22c3cd02212cb76ad0624a9aa9e3dada2d29dda4ae22a97f294a82", 0xf8}], 0x6, &(0x7f0000003340)=[@rights={{0x14, 0x1, 0x1, [r41]}}, @rights={{0x18, 0x1, 0x1, [r10, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r4, r42, r43, r44]}}, @rights={{0x1c, 0x1, 0x1, [r11, r4, r45]}}, @cred={{0x1c, 0x1, 0x2, {r46, r47, r48}}}, @rights={{0x18, 0x1, 0x1, [r5, r9]}}, @rights={{0x18, 0x1, 0x1, [r9, r49]}}], 0xc0, 0x8060}, {&(0x7f0000003400)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003700)=[{&(0x7f0000003480)="244e2637a254be95c1ea9f2de7bfca8014b2a45a782544dafe03a334ab086649cba9b27518ca19952fa874348b39d1a7a1ab3f7b5cc41dff3b3b34952ae027cc2cbd451152256e7db05965bb930c758637b71d934ad053587dec8fe44ed1fe16eec800ceb9ec61c5e1b139ad0e0c1b31b42e7063b99b3437c5b9285ad937198fb7c0ac0b50ddaa0c093d9463ce79248ed7d5c11a14f2eb1318739371e6176cd0121e667b13", 0xa5}, {&(0x7f0000003540)="d126aeb17f064e974d8ff2b846df6eb55ef11fc6cedd5cd4443ed4c51e750ec8aa627a627315bd2f121c74466869e166c55b8b5a443beaf2da483b65137b5f24ea844eeff2d66619cef3086138cd05c93afd6de6bc4c9633216e9bae3cd5f653792b41e20adf8f7ed70dcd616f9847399bde2ef3a02227b3b7f51c054ff99fb1b1f67cbf141a202e0b97657202105985eeda7026198b06e13983eeed1d7db6669cbd325a5085f1cb12e99dfa9be9f46224f84444428d8d865c7234e7d895bc8c4407f495b7a3a032a6e06d414ac4a80a154efc", 0xd3}, {&(0x7f0000003640)="c1b85fc67e6dd4a6b2db76368f621e5b7386d6d45fc4a78018a929b3b330de9b2fc0d12024665f3954d836787d867fa51500548dfdb7ee591e4c6a12c28e67d6d97d55ce39420c1c69c4a01bd98ec89ddcb014549f55c540bf5c42467adeb3655b4fe8d29a", 0x65}, {&(0x7f00000036c0)="67a3d1c7cbc665639b8ef2df35efbbfe4a97cc9a7c51b43ae1c96bbbe6b501b6f6c4198d51f9051ba8ceef3f90ec304decffe515ca8dab55d5458b12", 0x3c}], 0x4, &(0x7f0000004a00)=[@rights={{0x2c, 0x1, 0x1, [r9, r3, r50, 0xffffffffffffffff, r51, r52, r53]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r5, r54, r55]}}, @cred={{0x1c, 0x1, 0x2, {r56, r57, r58}}}, @rights={{0x20, 0x1, 0x1, [r59, r60, r61, 0xffffffffffffffff]}}], 0x90, 0x44000}], 0x5, 0x20000010) ioctl(r7, 0x8916, &(0x7f0000000000)) r62 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r62, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r62, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01200}, {0x6}]}) 21:16:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f00000000c0)=0x2, 0x4) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002cbd7000ffdbdf25050000000800010070f26ed70506abfb6233f9e5555663690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e"], 0x5c}, 0x1, 0x0, 0x0, 0x24008040}, 0x80) 21:16:01 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000002b0000", 0x1c) 21:16:01 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xffffffff00000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:16:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01300}, {0x6}]}) 21:16:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000940)=0xe8) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f00000007c0)='./file0\x00', 0x200040, 0x12) sendmsg$nl_route(r3, &(0x7f0000006340)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002880)={&(0x7f0000006180)=@mpls_getroute={0x1b0, 0x1a, 0x800, 0x70bd2d, 0x25dfdbfc, {0x1c, 0x10, 0x80, 0x7, 0xff, 0x2, 0x0, 0x8, 0x2800}, [@RTA_NEWDST={0x84, 0x13, [{0x8}, {0x1, 0x0, 0x1}, {0xc0000, 0x0, 0x1}, {0x2}, {0x800, 0x0, 0x1}, {0xfff}, {0x4, 0x0, 0x1}, {0xffffb}, {0x6}, {0x80, 0x0, 0x1}, {0xfff01}, {0x236, 0x0, 0x1}, {0xec000, 0x0, 0x1}, {0xffff, 0x0, 0x1}, {0xfff6d, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x8}, {0x68ba, 0x0, 0x1}, {0x12f, 0x0, 0x1}, {0x8001}, {0x6}, {0x6}, {0xffffb, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xff800, 0x0, 0x1}, {0x7f}, {0x8001}, {0x7}, {0x3f}, {0x7, 0x0, 0x1}, {0x3}, {0x40}]}, @RTA_NEWDST={0x84, 0x13, [{0x7, 0x0, 0x1}, {0x5}, {0x7, 0x0, 0x1}, {0x495}, {0x2, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x3ff, 0x0, 0x1}, {0x1498}, {0x7f}, {}, {0x7fff}, {0x40, 0x0, 0x1}, {0xff800}, {0x8}, {0x1}, {}, {0x800, 0x0, 0x1}, {0x8000, 0x0, 0x1}, {0x5}, {0x3}, {0x9}, {0x400}, {0x1, 0x0, 0x1}, {0x7}, {0x8, 0x0, 0x1}, {0xfc172}, {0x100}, {0x80}, {0x1, 0x0, 0x1}, {0x3}, {0x9, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x7, 0x0, 0x1}, {0xffffc}, {0x8001}, {0x400, 0x0, 0x1}, {}, {0xffff}, {0x4}, {0x93c}, {0x7fff, 0x0, 0x1}, {0x9}, {0x7}, {0x5}, {0x9, 0x0, 0x1}, {0x4}, {0x2}, {0x8000, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x7}, {0x100, 0x0, 0x1}, {0x20, 0x0, 0x1}, {0x7}, {0xbcc}, {0x3ff}, {0x1, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x1}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x6}, {0x2d7}, {0x55, 0x0, 0x1}]}, @RTA_DST={0x8, 0x1, {0x2, 0x0, 0x1}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x1}, 0x21) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r5}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000fc0)={'erspan0\x00', r8}) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r12}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmmsg$inet(r0, &(0x7f0000005f80)=[{{&(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="262601e85e39ab8a031bd65314b70b87c4e53f8850", 0x15}], 0x2, &(0x7f0000000200)=[@ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0xf8, [@dev={0xac, 0x14, 0x14, 0xf}, @loopback]}, @ssrr={0x89, 0xf, 0x9b, [@remote, @local, @multicast1]}, @end, @timestamp={0x44, 0x18, 0x3c, 0x0, 0x0, [0xffff073a, 0x9c, 0x4, 0x2, 0x578b]}, @timestamp_addr={0x44, 0x14, 0x96, 0x1, 0xc, [{@remote, 0x3f75}, {@rand_addr=0x10000}]}, @lsrr={0x83, 0x13, 0xde, [@loopback, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x8, 0x82, 0x0, 0x9, [0x10000]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xdc}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}], 0xd8}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000340)="72f150059a6fd2202f86cdd26c4c17d93377227f3d749e477c7fcd8311237d1c38207103be49894fe81e87ed0a81ec3b8d21966d51c8a902d6c876896ea4c99023bd510af3ad2cc93a9bef3bcb387a78d70a7c8cfa2a26a07a79b6a024859a2f1929d3e37d62a37ef43f3b28740183d7f9dd2b499e6db113df9c6da543130d9cf6d68c5707ca2f4a74d749ac006d393b061bb7fc56553c932f60d6c3ec26daa0df456238f00647a70327bd0cd2b1a3aa5059356faa3921312bd3182f7c420f6740d627dabc98589442fae66b000b59ef56b1e628940578c42a01d39c0caf31c24481a7ba5ee750f53ddde088b43204", 0xef}, {&(0x7f0000000440)="66b8dd2f8622262cc5655aebc7d91b9e99eed7bfb268872d8ce66aa157652127ca8772cd9d3ead6e268e6bfea14436a8222116fa3348407403e9863102aadfd40bbc84a33281aea2e2a926c235b8f1015dba707c92d0ef9fbbe46174ab748c85f14bf048041ad761a68f1e9d103ce1a087f245d15bd5ad7d680fb6b84658bc08518652dda2e63dad99ef9257c1d6464a133443d3cc78e0a6b293cb44fc6bd6a2619073de1d43027f5e0d9140f58a05beaab4fe42aee44ab8e913d5735ff43c246caf0b67fccc8e6c886f23cccf44b1221d2a79c4fcbfa97fbb86161a829612c1d94a9f4251b40f", 0xe7}, {&(0x7f0000000140)="35d4e0da6191b438bbaf03d1e182b72023bf8e90b4bb9c788cf6ebdbc1928829b2dae3b9223afde1c6f32190d92a3d434e4f3e", 0x33}, {&(0x7f0000000540)="6754fb5d94ce1a09ea322910803880e105d66bb4bd73122fe5a15e3aa54e5e30a36df88d8de2cde680b0ab905f02dde3cb9fb52aaa4474d3105cf48bf420b62fff8fc24920aca41c19ceaa14631d66dc8a8bbbc26933a1a43412db367643b30320c567e418d7557a007a3233d47e782d0c0fd0dc2c8b05c59ba4717e924ff7ddb765fdecd6a3415630203894d51f2927ac54", 0x92}, {&(0x7f0000000600)="58def1bb2a460cb8cd94824ba5de24e3285d00580e986fa2781d1008e912afe6f10cca95fc71a6a4c822dd6bbc972bd8dc5b1625ff9923b7786c9f19e014ce8cc68c59b5b2a06f0fe7f6188e0b8df8433232b745a446fe5f6dd516f38c7fd39dee027e9f5bdb5585341357a9a71be7244c63f25ab9855db67e82856c23ec54f1d7c80075eb3e8200d7e967099adbe479e875e5ccf15190fcead005eb02544882cabfad6e35e2b06e", 0xa8}, {&(0x7f00000006c0)="9ca9ce3c4cd0713a386a47bb650fbf501dd64e75b1a7d93103846f017985443064fd59580117a1c7339f117d7aadecd62536bf9a2c594b586486ab35deb35284e990b2", 0x43}], 0x6, &(0x7f0000000980)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @broadcast, @local}}}], 0x38}}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000009c0)="c5b048bf8bfc2e3534174a911e655ccaf8b96bae8bba2c281e144ef5e961f7b714cffb504c3d2d30eea1e6fa86f90d6140f2a3cefd7b7d34b4ea36e9", 0x3c}, {&(0x7f0000000a00)="18667cd196f5208d506e162391e3eb8fb94f6ccb4d93d3ac8231d2b953ff3b6916096961c5b7d32c689cfe75b5ff544db8759ddaa88ef8cc74d76cdc82b0abbc89dfb1886fc61be6318c03e52d97f829458aaf0b6f190464f87ea4ce8611e262079902e046a8b7d1aa128e0a7ebdf3aee403ffbad852417656abee266ec528e7dd5c958a866df79f7a58d854795a4168d140c7d3477ee81414c6e2031e17baa5f8cf3a8e00a816843ffdf2537880d231b31c71d6cf8651753737d9a9acffc6e5672eebb8e8ad5e80ea3adc15bd1431dc8a1dc5d6f681b33d90b990c2315c34a26cc0f1df4d6f4cf2601143de", 0xec}, {&(0x7f0000000b00)="4366776c63f45f254aa762af10eb1e3b8ba99b7cbd953a41e36f465e88e616b6d1467301f4e89ed5d54924effe7837a3845981d178a39e453ecac54c391d922b3a195c2b232c89a415b6885ec669561d47cbe32007f82ad5c3d02d0485cd8706dae1549ab227c834f7be37f1e0f50a79a8b7a8374c2836bfcb33577eff74e690098f73af526eb3a09dff4c8c3e0892d41d058474726ea6b0520563f3b56c54a1667b72eb694f756f037f8258033338c9314f44692481cc17151163c9bc94d71969ab4b4c1b2c20d2c4643514ab6010790970dbbe4def8e4b3f4b686575bf79063c2dfa", 0xe3}, {&(0x7f0000000c00)="60f253938bb341c372bddfa0b356cc81673bf60cc71a3ba2b7f42ec86adb76d91e4bc96ece922337b15cca7342b8461eb6df6fc913c1225afede6ab06148a83cdcad44983fe80b1b8a0bf397f6bcc180e5cc0b09616f811cdd936d7d13ed80035eca6d5dde1441227f8ae24fe9587b7069b6d403576f584c63647e87be86ef0574a80978bb64eee96d741e415d2530a747558465d55b83c3e19933f7237485dffbe341fc0610d1ffaf4fa713f8d5740a41df0939fec1413d5ce08d92a25f1d016773252a723f766518102b452cfb5a2f6a5ca08f8367859b2b620fbcff50d93e86300f94b5314fce77", 0xe9}, {&(0x7f0000000d00)="ad2c", 0x2}, {&(0x7f0000000d40)="f17cd7f240936953be5d0d709697a03005a2ea3a8fd43be761e399c284b295e1006cab6cdf2c9c05db8f1f67869e4b697c4fbdefcb38535c5cedfe03f9dc1ff0a38ac660220ba30ae210e7e41987cc6f2b17a7a2bd6d2221e446999b1a30559b5c977f7455a61f4d6796105ccdb24334225cc49923a0dd5180002e6ff23aef50502b7fa1bc1c3506c3f159bb4c4cda95b45e37b3685b7787ef0e1a037c1b2946571750d7434a04a03ebb9243520ecf7d1d9fa955d3d3ba6665f3b5c99b1823253aad07483f2e642ae969043e1c02feae57959198c52b985aa4ac71b3aa5848d72b43532e", 0xe4}, {&(0x7f0000000e40)="6bf2f280e0df222364611bd881635d9015d419b8f34b780ffd51636712b5a6365f81c994b1009a466581f1c8633049253e70c4e282e3053d51830a05deeffc28dd4ddc56842bd32804e47fef0470136566362bd4898c086a627f8db286ab60106cc608384a1f26fcf1b407c0db0c831b1d1353eba532091618ae77800c187ce7285d1240c5c3039147eef02332b61919dd2c084967294e1a7e2a2f24dfd5c558d27f496b09e6cc593a1abffa11c4f4cd92d1363412016a03ba047d72f8d5c35a55f29f6f63abb8f7d78aef5739e25fd51093d5b14e04d3f39b88270019d7f0b14ed4e206a2499e76ee93988c1b8a61aeee0c38525db98c6cb4835bed01f1", 0xfe}], 0x7, &(0x7f0000001000)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3e}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast, @empty}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfa}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}], 0x100}}, {{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001100)="c63ad11991036cea8c838c7bc43fe9895c896d6040772477a50674b040", 0x1d}], 0x1}}, {{&(0x7f0000001180)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000002700)=[{&(0x7f00000011c0)="ef84a3ad138adf251176e3d60805ac9b5c8ca0f4e3d83151ce18546abef5eda4f8e4ccf122ab28d5a9db0d9f1357ecd38fcdb03451d2655175b69a212101abdce7142e3f28a71abcfd9807340632f59eb8035bdd87af2818e8770f3d766d2b7333f63a2a54139eaa9802504e46c4167dd8361193c6cf9954740d72d57b62d82fc4ac7113305d70d48dda535cd27f4e94b5fc424354805524d76d1db49c3431917b1d60efdf22a5d50fe1232be7d8765bef02671dac9016", 0xb7}, {&(0x7f0000001280)="a76d2cf0dc5b2209baba14d26c0df3d72fb49a1e851b5efc56df76d43e1ba688866e4054df7e33cef440a87420f335f5e9a4662098d7a76ef002a6b9b2379fd9a3dd8b305d85209cee7e7c7c21df7a8efa1055e6576979ca9d47d1231b0ed594b4849f4036f1354d947b17ec032dc52209c0a8f2748e7f43e89ff41209bf2cadba55065eed35a43984dbff6f3493800f5bc66445236b7a78e53da2293f553f4dd5c89305f80591dbde7ed1945c8904fd6d047bd5f8bbf8f172cfb6b659b7f35ac4bc8e150d47844e48fdf837", 0xcc}, {&(0x7f0000001380)="fe39602b796282b112fa4e1f84158b44718238e11c9c265fc9d485c88fa425c0d0a15992dc4b0e79c573e014f181c357506188b813a2c2086e17d03754bba059ffab2d6a3edfc72e0e5af7a756414f4a3c31a554426dcaeec649dd2973f3a05a80b3f0b0b064cd236d8ce7c8ba3c08fb858ab5d929acd2b2ac3b60bafd19f703b5c7082c4c9ca5db6a839a2b4be34be5740fbc413ca3e70300f95c66e31ebd3ff77e2dd497cf7acb5213cf4c307d0799b0ae8c4c24b7b47808a0710d545281e3a352c0cab69fd2d4ab5bb670b995257e1acb1b0379fc13ef1e26f9c8824f51cc2224decd3fa1559231cfc157", 0xec}, {&(0x7f0000001480)="a258682bfa6879f09fc5e2957bde8b029200f9d8137be99c14348299d05e887b4687205a62d6554996e051", 0x2b}, {&(0x7f00000014c0)="4112244ba6886bd6ba542abaa65b34f1a78c9dcf0e17c7bd4f7f05b3f0c8f3b39c1ac5a79ea74cce917af81901dd9fd0a92fadcbd52790426ea4", 0x3a}, {&(0x7f0000001500)="8a54182bce299d990424a2d623c630099d5e7e97ca0d77355024e241dfeb835d6c09", 0x22}, {&(0x7f0000001540)="ea1eb1728d50859bd41acae7f1d008cbc4aa22f3f909a8bfaf9524976d9758d6231528aadbc65802e45adf6f31a4fec546c566bf82b4160249bf92bc436d24b3fc835415ade4fc5f23680a", 0x4b}, {&(0x7f00000015c0)="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", 0x1000}, {&(0x7f00000025c0)="73fe4e6ab66e6429159c8197dca17ef0148155af5c22eda49515dd6d8234e9432233966373606c7d85ea254cc633c2d7875ca4b72aff2f0b5840e643beab5a3827669e1f5034393bb1a83db7498c8e94c66bba115604b422d7d16a428e9ff45c35fdcf8791b67ae6b561f86dc66e964bb5416c2e67f823a96aaaa686c95b081ac7d50b5da3c71fbaa95a12c277b2138c6989c2ce4017ac50f127c27d6c6dc5b38a713208853316", 0xa7}, {&(0x7f0000002680)="fd89104683acdf61340699d173c1f25e57a97007ab6f4eddef6c775d5d0f26e3b6f2931bac4c3b97b3214a7e5eb3daff6841954e68976814df1ed0b68b25854a88b1fffddd9569a2df2373e040fd8dc5a6cc83a21a17e8fcac169d557849c047d4f94babda66971cbcf4b8d9ead8296d", 0x70}], 0xa, &(0x7f00000027c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x400000}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@generic={0x7, 0x11, "a12ae72b1e7f4aeb55b18c61bff39f"}, @ssrr={0x89, 0x7, 0x9, [@multicast1]}, @lsrr={0x83, 0x7, 0x26, [@empty]}, @generic={0x82, 0x8, "85fc4b8ec0d8"}, @lsrr={0x83, 0x3, 0x55}]}}}], 0x58}}, {{&(0x7f0000002840)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000002900)=[{&(0x7f0000002880)}, {&(0x7f00000028c0)="c9a08e3bef8079e918282af91277ac13cf2eb52ed87e4fe5413eb5a0d58e7f700b39790b", 0x24}], 0x2, &(0x7f0000002940)=[@ip_retopts={{0x44, 0x0, 0x7, {[@end, @end, @generic={0x94, 0xd, "b0b10afc078dd532404aa9"}, @end, @rr={0x7, 0x23, 0x28, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, @multicast2, @multicast1, @multicast2, @dev={0xac, 0x14, 0x14, 0x1b}, @local]}, @noop]}}}], 0x48}}, {{&(0x7f00000029c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000003a40)=[{&(0x7f0000002a00)="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", 0x1000}, {&(0x7f0000003a00)="948ad36a01f188465e013ca76cac8fe1bc712a28012b61ac196a8f0b5c4bee4f88db47f2f59c19e7fddde294bf0aaceee893df25", 0x34}], 0x2, &(0x7f0000003a80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_retopts={{0x28, 0x0, 0x7, {[@lsrr={0x83, 0x13, 0x1e, [@remote, @multicast1, @remote, @empty]}, @ra={0x94, 0x4}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @local, @multicast2}}}], 0x90}}, {{&(0x7f0000003b40)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000005ec0)=[{&(0x7f0000003b80)="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", 0x1000}, {&(0x7f0000004b80)="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", 0x1000}, {&(0x7f0000005b80)="8e8e9e09e5f37d556b02bc2cfe9a23c1c5e7276e9a31c943d1a7faa1ab475d5bac3b12ea48d10b9d6dda943a8cc3e1ddeb030166df67c505fcf9b0279bbd60d300a6e2bee5cf1aed451979574a768030baa5ac8573f56a56839b0f0e32f1f68c47aa51c83f09a410aae0cf849382d3650e2494b0d1244e3bd0607b25f711d5fd726b2d70199b2b5defab9be4a17cb2312e1e3ba719a2da54aca43be84b578a201a21c802e4e2730b16079eefad62550f5929e23a8db1f2767e1170a46af80902d2d89a4beffcd6c757a35c3e6b64ee854efd501bb6cf145abf7eae3252cf3c59bb8a15b86d71ee", 0xe7}, {&(0x7f0000005c80)="a24ba5bdf9f3c158b583df2182adbb6ef235bf3d6aecb71492285ece3f50f122f73063f8cc8b09a1d1fa0f675c2e7260ada753fbb4e56fcac1e7afff03248d68823ee0f7e2e3580c16c392668a5ee7afd492a9e19fce074dfbc73afcb30155beac29f6d624a2250e90f9712912893b88879f1b2a2aa0e9e905b25591ee5a1490460659a3a62db61d30eba3bc9dbc6e05214f0db8ddd6ff3cd419086d2a6ac4cd3c96485f996777383a9fa8170005ef16349ab86065de2376b8a24d896668a6ccf857bf27dcd9d0b388de0d273058968b8346891bf72a57da4df5b79adbde3b0075ffe61de1b8183c01", 0xe9}, {&(0x7f0000005d80)="9389632196a7f0e6cb4185f28f34e0f24f43b60b36bde02ba761451e4ca50de1a68095f202b6bbf3a3e4c3d5bc2abe41654c35d45d805e5d3416f18a7422511d8ac7e03e97b04e84be536f42bba14e83cdd9e3783fc02033323795b38fe505d0a9af0702bee9fd544edb576206c9ee816c8bceac6654ba3c345c44df4504d9ebe8e6572c4a314a7fbdb231c41775ecee7e7d8bf7b585393eebef871158a0e31fd5bf010f31f14db6fe5269c80779", 0xae}, {&(0x7f0000005e40)="0b97033fad13ee96c8d900a3b380cd73266475f5d754a8329a0e59f6206fc205451e686d7f1138911f83cffc2b98b7dfe903b5db2a48b6b32483227bc7e8b137da39650f17c95d80064eec8b1e1906d5ac3fb7256c10bb1b54", 0x59}], 0x6, &(0x7f0000005f40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}], 0x30}}], 0x8, 0x4c081) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') 21:16:01 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000002c0000", 0x1c) 21:16:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01400}, {0x6}]}) [ 1036.823293][ T8700] selinux_nlmsg_perm: 6 callbacks suppressed [ 1036.823304][ T8700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8700 comm=syz-executor.2 21:16:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01500}, {0x6}]}) 21:16:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r5}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delneigh={0x24, 0x1d, 0x200, 0x70bd2d, 0x25dfdbfe, {0xa, 0x0, 0x0, r5, 0x2, 0x18, 0x5}, [@NDA_PORT={0x6, 0x6, 0x4e23}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044000}, 0x4000) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x7fffffff, 0xff, 0x1ff, 0x100, 0x9000000000, 0xefa, 0x4a1, 0x9}}, 0x43) 21:16:02 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xffffffffffffff0f}}, {@max_batch_time={'max_batch_time'}}]}) [ 1037.626164][ T8702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8702 comm=syz-executor.2 21:16:02 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xffc1) connect$pppl2tp(r8, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x3, 0x3, 0x1, 0x0, {0xa, 0x4e20, 0x4, @rand_addr="d9ad492a2eb521e43b8160df9eba2331", 0x80}}}, 0x32) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000400)=""/234, 0xea) 21:16:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01600}, {0x6}]}) 21:16:02 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000002d0000", 0x1c) 21:16:02 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0xffffffffffffffff}}, {@max_batch_time={'max_batch_time'}}]}) 21:16:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x4, &(0x7f0000000080)=[{0x6, 0x0, 0x15, 0x7fffffff}, {0x0, 0x0, 0x0, 0x400}, {0x6, 0x0, 0x0, 0x3}, {0xf004, 0xf5, 0x8}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40400, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040)=0x2, 0x4) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x4000, 0x10, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, r4, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$NS_GET_OWNER_UID(r6, 0xb704, &(0x7f0000000800)=0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880)=0x0, &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r11, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r13, 0x0) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)=0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r15, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, 0x0) r17 = getgid() setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000bc0)={{}, {0x1, 0x2}, [{0x2, 0x6, r1}, {0x2, 0x5, 0xee00}, {0x2, 0x0, r2}, {0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x6, r7}, {0x2, 0x2, r8}, {0x2, 0x0, r9}, {0x2, 0x6, r10}], {0x4, 0x4}, [{0x8, 0x1, r11}, {0x8, 0x0, r12}, {0x8, 0x2, r13}, {0x8, 0x5, r14}, {0x8, 0x4, r15}, {0x8, 0x475dcdb1aa9b429e, r16}, {0x8, 0x5}, {0x8, 0x0, 0xee01}, {0x8, 0x2, r17}], {0x10, 0x2}, {0x20, 0x3}}, 0xb4, 0x3) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=@deltaction={0x230, 0x31, 0x200, 0x70bd27, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x34c}}]}, @TCA_ACT_TAB={0x20, 0x1, [{0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x48, 0x1, [{0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xe84}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7fff}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x20}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @TCA_ACT_TAB={0x74, 0x1, [{0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffff8}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10000}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}, {0x10, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000000}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x400c000}, 0x4000000) 21:16:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01700}, {0x6}]}) 21:16:02 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x5, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}, {0x800, 0x8d, 0x4, 0x6}, {0x7f, 0xba, 0x8, 0x2}]}) 21:16:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:16:02 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000002e0000", 0x1c) 21:16:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0xfd}, {0x6, 0x20}]}) 21:16:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01800}, {0x6}]}) [ 1037.869625][ T22] audit: type=1326 audit(1580591762.932:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8740 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 [ 1037.896910][ T8745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8745 comm=syz-executor.2 21:16:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c, 0xfe}, {0x6, 0x2, 0x8}]}) [ 1038.663802][ T8757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8757 comm=syz-executor.2 [ 1038.677937][ T22] audit: type=1326 audit(1580591763.742:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8740 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:16:03 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000000000002f0000", 0x1c) 21:16:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01900}, {0x6}]}) 21:16:03 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14027}, [@IFLA_MASTER={0x8, 0x13, r5}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r2, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x400, 0x1}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xc8}}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_MAC={0xa, 0x6, @random="0fd30ad22a25"}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local}, @NL80211_ATTR_MAC={0xa, 0x6, @local}]}, 0x70}, 0x1, 0x0, 0x0, 0x48010}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) 21:16:03 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}, 0xa}, {@max_batch_time={'max_batch_time'}}]}) 21:16:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x8, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:16:03 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe7, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="1400c730", @ANYRES16=r5, @ANYBLOB="000828bd7000fedbdf250220766e5900060000000080"], 0x3}, 0x1, 0x0, 0x0, 0x20008184}, 0x40480c1) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r6 = socket(0x15, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0xff, 0x0}, 0x40000200, r7}) r8 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) splice(r9, 0x0, r10, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r9, 0x40045436, 0x34) ioctl(r8, 0x8916, &(0x7f0000000000)) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r11, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01a00}, {0x6}]}) 21:16:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80, 0x40800) dup2(r0, r1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) [ 1038.834920][ T8768] EXT4-fs: 1 callbacks suppressed [ 1038.834932][ T8768] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000 [ 1038.834932][ T8768] max_batch_time=0x0000000000000000" or missing value 21:16:03 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000300000", 0x1c) 21:16:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x260) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x1}, 0x16, 0x1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fallocate(r2, 0x2c, 0x1, 0x8001) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000000)={{0x6, @multicast2, 0x4e20, 0x2, 'wlc\x00', 0x2, 0x3ff, 0x73}, {@rand_addr=0x881, 0x4e20, 0x0, 0x8001, 0x100, 0xff}}, 0x44) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0xffffffff}]}) 21:16:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xf01b00}, {0x6}]}) 21:16:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x2, 0x3, 0x208, 0xa0, 0x0, 0xa0, 0x0, 0x0, 0x170, 0x170, 0x170, 0x170, 0x170, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x6, 0x6}, {0x4, 0x5, 0xb1127d6f5db716f8}, 0x61, 0x3}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5]}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x268) accept$inet(r0, 0x0, &(0x7f0000000000)) 21:16:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @window={0x3, 0x2827, 0x8315}], 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$OSF_MSG_ADD(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x268, 0x0, 0x5, 0x3, 0x0, 0x0, {0x2, 0x0, 0x1}, [{{0x254, 0x1, {{0x3}, 0x2d, 0x2, 0xc5, 0x20, 0x18, 'syz0\x00', "4fe11d4432c558f16db9d956207643485820064d4ed56fcf7bddab70c36083cc", "4025d6e15a40c48f95e1df11892fd998ae78643a39579f50c422b667259bd1a3", [{0x3f, 0x24a, {0x2, 0x6}}, {0xee1, 0x5, {0x1, 0x1ff}}, {0x5, 0x3, {0x3, 0x5}}, {0xfff, 0x20, {0x2391578bc461afe7, 0x20}}, {0x2, 0x8, {0x0, 0x3}}, {0xfbff, 0x1, {0x2, 0x9}}, {0x3, 0x7, {0x1, 0x7fff}}, {0x3, 0xfffe, {0x2, 0x8}}, {0x380, 0x1ff, {0x3, 0x1}}, {0x200, 0x6, {0x0, 0x9}}, {0x3f, 0x1, {0x3, 0x345a134e}}, {0x5, 0xfffe, {0x1, 0x81}}, {0x3, 0x1, {0x1, 0x7}}, {0xfff, 0x88f3, {0x1, 0x7}}, {0xffff, 0x3, {0x1, 0x502}}, {0x13d, 0x200, {0x2}}, {0xfff, 0x337d, {0x2, 0x10001}}, {0xff81, 0x5, {0x2, 0x6}}, {0x7, 0x4, {0x2}}, {0x6, 0x5f2, {0x1, 0x8}}, {0x3ff, 0x40, {0x3, 0x56}}, {0x9, 0x4, {0x2, 0x2c}}, {0x8b9, 0x3, {0x3, 0x6}}, {0xffff, 0x24, {0x2, 0x1}}, {0x6, 0x2, {0x0, 0x7}}, {0x1, 0xff, {0x1, 0x8}}, {0x9, 0x3, {0x1}}, {0x9, 0x100, {0x3, 0x7}}, {0x20, 0x8000, {0x1, 0x1f}}, {0x1, 0x7, {0x1, 0xd2d}}, {0x1, 0x4, {0x2, 0xed}}, {0x4, 0x4, {0x2, 0x6}}, {0x1, 0x7ff, {0x2, 0x1000}}, {0x20, 0x0, {0x1}}, {0x400, 0x1ff, {0x0, 0x4c1e}}, {0xf1, 0x8, {0x2, 0x7ff}}, {0x6, 0x7fff, {0x3, 0x8}}, {0xb51, 0x101, {0x3, 0x7}}, {0x4, 0x3, {0x2, 0x100}}, {0x81, 0xffae, {0x2, 0xc8}}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0xc000000}, 0x8c0) [ 1038.942898][ T8783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8783 comm=syz-executor.2 21:16:04 executing program 0: 21:16:04 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000400000", 0x1c) [ 1038.990740][ T8794] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000 [ 1038.990740][ T8794] max_batch_time=0x0000000000000000" or missing value 21:16:04 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}, 0x15}, {@max_batch_time={'max_batch_time'}}]}) 21:16:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1000000}, {0x6}]}) [ 1039.191048][ T8806] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000max_batch_time=0x0000000000000000" or missing value [ 1039.330549][ T8808] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000max_batch_time=0x0000000000000000" or missing value [ 1039.703709][ T8811] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8811 comm=syz-executor.2 21:16:04 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000002c0)="cd", 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f0000000080)=""/79, 0x4f) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r1, 0xfffffffffffffffd) prctl$PR_SVE_GET_VL(0x33, 0x97a9) keyctl$describe(0x6, r1, 0x0, 0x0) keyctl$link(0x8, r0, r1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f0000000000)=[{0x800, 0x40, 0x0, 0xfffffffc}, {0x3ff, 0x20, 0x0, 0x80000001}]}) socket$nl_xfrm(0x10, 0x3, 0x6) 21:16:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe7, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x4ffe7, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) splice(r9, 0x0, r10, 0x0, 0x4ffe7, 0x0) ioctl$EVIOCGSW(r9, 0x8040451b, &(0x7f0000000080)) 21:16:04 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000ffffff9e0000", 0x1c) 21:16:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x2000000}, {0x6}]}) 21:16:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000580)={0x1, &(0x7f0000000100)=[{}]}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r7, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000040)=0x101, 0x4) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:04 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}, 0x16}, {@max_batch_time={'max_batch_time'}}]}) 21:16:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0xfd, 0x7fffffff}, {0x5c}, {0x6, 0x0, 0x0, 0x2}]}) socketpair(0x9, 0x3, 0x20, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x36, &(0x7f0000000040), &(0x7f0000000080)=0x4) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe7, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x28, 0x28, 0x1, r2}) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000200)="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") 21:16:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x3000000}, {0x6}]}) 21:16:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x2, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x109000, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000100)='veth0_virt_wifi\x00') openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) [ 1039.808172][ T8827] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000max_batch_time=0x0000000000000000" or missing value 21:16:04 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000caf0000", 0x1c) 21:16:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x60000, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe7, 0x0) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x1f, 0x9, 0x70, 0x37}]}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0xffffffff, 0x0, 0x10001, 0x5, 0x7, 0x1f, 0x7f}, 0xf) 21:16:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000001c0)}) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206026100a843090a26234d25000700080002000800000d0000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000040)="0cc0f84fe26eb4973e5536bc65dabe726e9313df3644f95b5e10a56b8003ace1a4716d4c1a53e71468d38a68419418b47174548db098c54e0bf1371ec940483bab4eadee3720c50bf95ab953087df603f385ce8f83e2d553c71c1caba853d90073ff88347d2d245718f39adf65c9c8f84da1d69b7017e16033c2379f8a1b3fa963d6b4bed550e770de7eafe8b3ef785e26b7a9f753b7ceb7b8b5feb01fe437a064f941175d25a2f13444f52f69a878c582ea101e921de8a81820a17579cf43e895f924597d4d53257c31c418ae8657025616bd285ba96b9c9f3fbb1b0c76e5c351e2773ab4b4bc23ea600a423868c3d7d7a5ca242822", 0xf6}, {&(0x7f0000000140)="de399485d117576bc13aba4d3321c2812b3df75b0a94d67eb65adc7f4106fd88df880bf537d6b1bfbad3d35caf1bff6e80", 0x31}, {&(0x7f0000000200)="27f95e102addca1ae7ad78025f51ca212eb117a79fa698bdfed6af75701d9c86ab7256575d238a97e27c01ce2bd9c56597257a1a7bd2dd11cb99b449e8ce0ffd52da3aafa63e6b28", 0x48}, {&(0x7f0000000340)="14f123ce219ec41246554ab6c370294e882240baabb0da16d44e1967365465d9ef6773d17026e28209a456bfb39c51d647768c60d71480131421c32c7a3920e32207f3d36275a7782a981b72d7a23c85d4801a80c6fd54e04d5b2abffe3ba30faed67992a19dbbd74fdf563337a2e01afb2bf62366347a41e93f0f7a998f1e63d86720240bb286b911a6e5daeefcd7aaa437d0f215ef606065df6f98789dcad9f860db2bf8b4ae4d31e499bc884c51d19cbb321ab80de13a0c94", 0xba}, {&(0x7f0000000400)="2c59e29ee1ac5577030cf9da8f71434813e45c5b1d4c4605bd3639f43224f4beeab9363b4c41ececdaa17e1650ad06f94c7abb5704e83ea02309940d2d5b09220a26f8c5ee534f12a9337eac1df258bf104a618e9e5a6462395336869be3fb4e88bf343fbf4009faf4ec8565813c5088fc5f5f34a9ba7b4f672ad608d834d9a189f019f3642135b4b114f4129d55415a9f9138d6bde7589d2b6df41901348c89b8026f480c1fa49b05a7b8b6021aff0fe5ab818d5e", 0xb5}, {&(0x7f00000004c0)="1afce28ef9d7aaeb065a99d0fadb16079dd4de3a2a576ca03c8153a8ce968acc837708a322c577f7d7a5f0cb46ad4ac258d7f55a8938ede6ccc3470abd7889b250b70464ee0cf466f4e9f01157d73e919dd1321d83ceef89724f4443a824e4be3bdae39ea4b39966cda4153a95b2d1171d14a2fb2fed7228e0ac3a6179449df780b1", 0x82}, {&(0x7f0000000280)="2d2d470049029adf0fdd7677d5c84ee101b7b83e0a957981749c770b0843a989e70d406c884dc1df697b931450fad62c34a1f9253834a45d5cc6b56c4a44e2880cd43305fe2e8b0d6f1f1374e14552dbb545a43b3e3a01c2731e878eecc39a51097e77545aa52af98b08f6613db44a64b8", 0x71}], 0x7}, 0x4080) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)={0x800, {{0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1, 0x1, [{{0xa, 0x4e23, 0x7, @loopback, 0x80000001}}]}, 0x110) 21:16:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x4000000}, {0x6}]}) [ 1039.857336][ T8837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8837 comm=syz-executor.2 21:16:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x5000000}, {0x6}]}) [ 1039.936834][ T8853] netlink: 'syz-executor.0': attribute type 7 has an invalid length. [ 1039.947023][ T8849] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000max_batch_time=0x0000000000000000" or missing value [ 1039.967269][ T8853] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 21:16:05 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e2800000000000ec00000", 0x1c) 21:16:05 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000003780)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000003800)='nl80211\x00') pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe7, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x10000001}) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000003900)={&(0x7f00000037c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000038c0)={&(0x7f0000003840)={0x58, r1, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x1}}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x4}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004894}, 0x4810) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) [ 1039.991451][ T8860] netlink: 'syz-executor.0': attribute type 7 has an invalid length. [ 1040.013744][ T8860] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1040.696464][ T8837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8837 comm=syz-executor.2 21:16:05 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={r0, r1+10000000}, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x4, 0x101}, {0x6c, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x1f}]}) 21:16:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x6000000}, {0x6}]}) 21:16:05 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000d20000", 0x1c) 21:16:05 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}, 0x22}, {@max_batch_time={'max_batch_time'}}]}) 21:16:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5b}, {0x6, 0x2, 0x0, 0xc8c}]}) 21:16:05 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe7, 0x0) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000040)={0xa, &(0x7f00000005c0)=[{0x8, 0x2a, 0xff, 0xb9}, {0x9, 0x1, 0x40, 0xe61}, {0xffff, 0x0, 0x1, 0x71ec}, {0x1ff, 0x9, 0x6, 0xffffffff}, {0x5, 0x2, 0x28, 0x9}, {0x4, 0x1, 0x6, 0x1f}, {0x1f, 0x4, 0x3e, 0x9}, {0x3ff, 0x7, 0x63, 0x5}, {0x2, 0x6, 0x7c, 0x26}, {0x81, 0x10, 0x1, 0xffffffff}]}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r5 = socket(0x100000000011, 0x2, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r6}) r7 = socket(0xa, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(0xffffffffffffffff, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x34) ioctl(r7, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x7000000}, {0x6}]}) [ 1040.848590][ T8876] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000"max_batch_time=0x0000000000000000" or missing value [ 1040.862286][ T22] audit: type=1326 audit(1580591765.912:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8874 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:16:06 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000ffffffea0000", 0x1c) 21:16:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x8000000}, {0x6}]}) 21:16:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0xc000000}, {0x6}]}) 21:16:06 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000ffffffef0000", 0x1c) [ 1040.951376][ T8887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8887 comm=syz-executor.2 [ 1040.969082][ T8888] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000"max_batch_time=0x0000000000000000" or missing value 21:16:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x14000000}, {0x6}]}) 21:16:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/154, 0x9a}, {&(0x7f00000000c0)=""/104, 0x68}], 0x2) 21:16:06 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}, 0x2e}, {@max_batch_time={'max_batch_time'}}]}) 21:16:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x15000000}, {0x6}]}) 21:16:06 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000fffffff00000", 0x1c) [ 1041.653438][ T22] audit: type=1326 audit(1580591766.712:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8874 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:16:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x16000000}, {0x6}]}) [ 1041.707868][ T8906] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000.max_batch_time=0x0000000000000000" or missing value [ 1041.790479][ T8914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8914 comm=syz-executor.2 21:16:06 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0), &(0x7f0000000380)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r6}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@empty, 0x71, r6}) r7 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r8, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r8, 0x40045436, 0x34) ioctl(r7, 0x8916, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) rt_sigprocmask(0x2, &(0x7f0000000000)={[0x62]}, &(0x7f0000000540), 0x8) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r9, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:06 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0xff, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x20240, 0x0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000100)=@urb_type_bulk={0x3, {0xe, 0x1}, 0x200, 0x6, &(0x7f0000000040)="8ce6af1864d9a0a642b482d4d4d1b5be4dc81a08ab1dc76f11379842b7ca007a6df9fe86cf7d5672ed66d6918458fa6c1944a1ac4d91b1ea32f9a6defe14b853a822f058c37b55ee9442caa9a4d7427d20ff0d070958c25c6f1d817d83a73db259cb9c08c682e7b51c8e43978dbb7736ba2c7d46970be4", 0x77, 0x9, 0xf8ed, 0xffffffeb, 0x2, 0x3, &(0x7f00000000c0)="cfccaaac55fe20c5306297"}) 21:16:06 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000fffffffe0000", 0x1c) 21:16:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r2 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206040000a843090a26234d25000600080002000800000d0000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000001c0)=0xe8) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000400)={0x4, 0x8, 0xb, 0x0, 0x8, [{0x200000, 0x3ff, 0x411, [], 0x402}, {0x1, 0xff, 0x80000001, [], 0x100}, {0x8, 0x3f, 0x7, [], 0x2082}, {0x4, 0x8, 0x1000, [], 0x100}, {0x1ff, 0x9, 0xb, [], 0x100}, {0xffffffff, 0xffffffff00000001, 0x5, [], 0x5907}, {0x5, 0x3, 0x10001, [], 0x8}, {0x7ff, 0x5, 0x1, [], 0x601}]}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r7}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r10}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'veth1_macvtap\x00', r10}) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x13, r14}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x58, r1, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x2}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7fff, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2}}]}, 0x58}, 0x1, 0x0, 0x0, 0x10004804}, 0x40080) 21:16:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x18000000}, {0x6}]}) 21:16:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x2, 0x1) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000600)={0x3ff, {{0x2, 0x4e23, @loopback}}, 0x1, 0x7, [{{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e20, @empty}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e21, @rand_addr=0x7}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @empty}}]}, 0x410) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r2, 0x541e, &(0x7f0000000400)={0x1ff, 0x800, 0x80000001, 0xf227, 0x10, 0x3, 0x1ff, 0x6, 0x0, 0x9, 0xff, 0x3, 0x9, 0xb3b8, &(0x7f0000000380)=""/60, 0x2, 0x6, 0x2}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r3, 0x890b, &(0x7f00000000c0)={0xffffc0fe, @tipc=@name, @nl=@proc, @nfc={0x27, 0x0, 0x0, 0xb00}}) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'osx.', 'batadv0\x00'}, &(0x7f0000000240)='batadv0\x00', 0x8, 0x2) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9d3072f58258a6df}, 0xc, &(0x7f0000000100)={&(0x7f0000000500)={0xfc, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x2d}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x70a}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x44}, 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x30, r4, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0xfffff247, @bearer=@udp='udp:syz2\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x20040800) 21:16:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1c000000}, {0x6}]}) [ 1041.860855][ T8917] EXT4-fs (sda1): Unrecognized mount option "min_batch_time=0x0000000000000000.max_batch_time=0x0000000000000000" or missing value [ 1041.897132][ T8926] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:16:07 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time', 0xa}}]}) 21:16:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x1d000000}, {0x6}]}) [ 1041.928982][ T8926] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1041.959279][ T8936] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8936 comm=syz-executor.2 21:16:07 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e280000009effffff0000", 0x1c) 21:16:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x20000000}, {0x6}]}) 21:16:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000001c0)}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x5d, &(0x7f0000000140)=0xffffffff, 0x4) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg$sock(r2, &(0x7f0000000640)=[{{&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x4, 0x1, 0x4, 0x1, {0xa, 0x4e21, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x289}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000240)="099254b6b3193c7b67acb19cd220714b24bb5c1c5c59b20b300a3a40a24864c78c40ecd7f988521a2778a49f50ba290f54ac79a1a3a1dc9608a7e034ca61dcb7f90ad60f0b3f1c91b2d1e433f85480f64b4ecda64ce247a4230d851e81d56782b70b282bf70b29d5", 0x68}], 0x1, &(0x7f0000000580)=[@timestamping={{0x14, 0x1, 0x25, 0x2c}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x1ff}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}], 0x90}}], 0x1, 0x4000) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) splice(r3, &(0x7f00000000c0)=0x6, r4, &(0x7f0000000100)=0xffffffffffff8000, 0x9, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r1, 0x0, r6, 0x0, 0x4ffe7, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xa835, 0x7, 0x7, 0x7}]}) [ 1041.995571][ T8932] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 1042.030989][ T8932] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1042.767020][ T8943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8943 comm=syz-executor.2 21:16:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x80000, 0x89) bind(r3, &(0x7f0000000140)=@un=@abs={0x0, 0x0, 0x4e22}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000000)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x7f, 0xfd, 0x7fffffff}, {0x2c, 0x3, 0x1}, {0x6, 0x0, 0x0, 0xffffffff}]}) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)=0x80080) 21:16:07 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f0000000040)}) 21:16:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x21000000}, {0x6}]}) 21:16:07 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000eaffffff0000", 0x1c) 21:16:07 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time', 0x22}}]}) 21:16:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x5) 21:16:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x24000000}, {0x6}]}) 21:16:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6e}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 21:16:08 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000efffffff0000", 0x1c) 21:16:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x0, &(0x7f00000001c0)}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x101, 0x0, 0xdb7}) r3 = accept$inet(r2, &(0x7f0000000280), &(0x7f00000002c0)=0x10) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/cpuinfo\x00', 0x0, 0x0) ioctl$void(r4, 0x5451) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000340)={{0x5c, @dev={0xac, 0x14, 0x14, 0xc}, 0x4e21, 0x3, 'sh\x00', 0x6, 0xfffffffa, 0x59}, {@rand_addr=0x2, 0x4e22, 0x2000, 0x81, 0x401, 0x4}}, 0x44) get_robust_list(r0, &(0x7f0000000180)=&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f0000000200)=0x18) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/fscreate\x00', 0x2, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0xfffffffffffffb6c, 0x80, 0x3}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) 21:16:08 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x402000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x2) [ 1042.972399][ T8982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8982 comm=syz-executor.2 [ 1043.002342][ T22] audit: type=1326 audit(1580591768.062:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8983 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:16:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x5) 21:16:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x25000000}, {0x6}]}) 21:16:08 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time', 0x25}}]}) 21:16:08 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000f0ffffff0000", 0x1c) [ 1043.718012][ T8991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8991 comm=syz-executor.2 21:16:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x28000000}, {0x6}]}) 21:16:08 executing program 2: r0 = socket(0x11, 0x2, 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000540)='./file0\x00', 0x220040, 0x8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[], 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r5}) r6 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r7, 0x40045436, 0x34) ioctl(r6, 0x8916, &(0x7f0000000000)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYBLOB="ff39e34c701641b6a91f121528a060418765e321640bb227f76ad66dbc3062a7e3a88d62a3ed303e9e9de1b520aa07bdb9979cabada968b31e5063a93799edb5d36f90ec7666542adb7daa384acbd6bed2da4040c67ed79a2e9d4dfe8fa4b261a52f06cac6cf352db3679c64a8d0f4a83dca30a825256c4ee919f3aa129bcccaa36b8d5b98ff35a72f7a3fb6295467d4ac97945a3792bbee889d4d7d9b7159800edd54fb133be21c8d949da0", @ANYRESDEC=0x0], 0xd7) ioctl$FIONREAD(r9, 0x541b, &(0x7f0000000040)) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) pipe(&(0x7f0000000080)) 21:16:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000340)=""/4096) 21:16:08 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000feffffff0000", 0x1c) [ 1043.795252][ T22] audit: type=1326 audit(1580591768.862:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8983 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45e1da code=0x0 21:16:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/148, 0x94) 21:16:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1f}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x6000000}, 0x4000040) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x4}, {0x6}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000200)={0x6, &(0x7f0000000180)=[{0x81, 0x7, 0x3f, 0x2}, {0x8ca, 0x80, 0x5b}, {0x3, 0x1, 0x15, 0xffff}, {0x38, 0x0, 0x9, 0x81}, {0xdf8, 0x0, 0x78, 0x10001}, {0x7fff, 0x7f, 0x0, 0x1}]}) 21:16:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x2c000000}, {0x6}]}) 21:16:08 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe7, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r5 = socket(0x100000000011, 0x2, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r6}) r7 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r8, 0x40045436, 0x34) ioctl(r7, 0x8916, &(0x7f0000000000)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x260) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x8, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0xfffc}]}) [ 1043.900464][ T9016] EXT4-fs: 5 callbacks suppressed [ 1043.900472][ T9016] EXT4-fs (sda1): Unrecognized mount option "max_batch_time%0x0000000000000000" or missing value 21:16:09 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe7, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}]}, 0x1c}}, 0x20000010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:16:09 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time', 0x2c}}]}) 21:16:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x2d000000}, {0x6}]}) 21:16:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$TIOCEXCL(r2, 0x540c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x20, r4, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_MAC={0xa, 0x4, @broadcast}]}, 0x20}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x314) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = socket(0x10, 0x2, 0x0) r9 = gettid() sendmsg$netlink(r8, &(0x7f0000000300)={0x0, 0xffffffffffffff6d, &(0x7f0000000140)=[{&(0x7f00000006c0)=ANY=[@ANYBLOB="10000000000000000000831bf3130000"], 0x10}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r9}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f0000000600)={@multicast2, @multicast1, 0x0}, &(0x7f0000000640)=0xc) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x314) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r13}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000680)={'macsec0\x00', r13}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000007c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0x38, r4, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x46f111f2, 0x1}}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4048890) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x58, r4, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY={0x44, 0x50, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_SEQ={0x4}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "0c1ea211a91e735afec9c6455b"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "91fca7509e"}, @NL80211_KEY_SEQ={0x5, 0x4, '='}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000060}, 0x8000050) 21:16:09 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000001", 0x1c) [ 1043.976368][ T9030] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9030 comm=syz-executor.2 21:16:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x30000000}, {0x6}]}) 21:16:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffffffd}, {0x5c}, {0x406}]}) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r2, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4440142}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000c2abd7000fcdbdf250f0000002c0003803cdfd6b3040075ff499ce6e1354600a0c7116ab56b00080003000300000008000100010000000800020062ca0000"], 0x40}, 0x1, 0x0, 0x0, 0x20008000}, 0x80) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000180)={0x1, 0x0, {0xe, 0x1, 0x5, 0x2, 0x2, 0x2, 0x5, 0xdb, 0xfffffffffffffffe}}) [ 1044.057966][ T9040] EXT4-fs (sda1): Unrecognized mount option "max_batch_time" or missing value [ 1044.082109][ T9034] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 21:16:09 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:16:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x31000000}, {0x6}]}) 21:16:09 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000003", 0x1c) [ 1044.141110][ T9034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9034 comm=syz-executor.0 [ 1044.170266][ T9049] EXT4-fs (sda1): Unrecognized mount option "max_batch_time" or missing value [ 1044.866185][ T9030] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9030 comm=syz-executor.2 21:16:10 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r4}) r5 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r6, 0x40045436, 0x34) ioctl(r5, 0x8916, &(0x7f0000000040)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:10 executing program 0: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000140000", 0x1c) 21:16:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) 21:16:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x34000000}, {0x6}]}) 21:16:10 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}]}) 21:16:10 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:16:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) socketpair(0x4, 0x3, 0xbf, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x200, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20}, 0x20002058) 21:16:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fcntl$addseals(r0, 0x409, 0x4) 21:16:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x35000000}, {0x6}]}) [ 1044.965234][ T9067] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,max_batch_time=0x0000000000000002, 21:16:10 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:16:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x3c000000}, {0x6}]}) 21:16:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x900300}, {0x6}]}) [ 1045.032392][ T9078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9078 comm=syz-executor.2 [ 1045.066405][ T9083] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,max_batch_time=0x0000000000000002, [ 1045.836981][ T9096] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9096 comm=syz-executor.2 21:16:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x3d000000}, {0x6}]}) 21:16:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6c}, {0x6, 0x0, 0x0, 0x9fff}]}) 21:16:10 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 21:16:10 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time'}}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}]}) 21:16:10 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000040)=0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) getgroups(0x8, &(0x7f0000000080)=[0xee01, 0x0, 0xee00, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, r3]) write$FUSE_CREATE_OPEN(r0, &(0x7f00000000c0)={0xa0, 0xffffffffffffffda, 0x1, {{0x3, 0x3, 0xffffffff, 0x7, 0x0, 0x8001, {0x5, 0x8de6, 0x3f, 0x800, 0x0, 0x7, 0xff, 0x10001, 0x3, 0x3, 0x3, r2, r4, 0x0, 0x81}}, {0x0, 0x5}}}, 0xa0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5c}, {0x6}]}) 21:16:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x40000000}, {0x6}]}) 21:16:11 executing program 2: r0 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe7, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000040)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)={0xb0, 0xc, &(0x7f0000000bc0)}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="1c00000000001109f5da1d33b9a414a8f52cb811766503729d7670f61ff8378dd046ece2b65c907fd6f2ceae0aaa1f1d64ad12b36edd2d0a5c5fe1627251f09ad8e1d967990994fb8aae1e48aeaf9ec464ef48ad72e9a5", 0x57) r5 = socket(0x100000000011, 0x2, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) bind(r6, &(0x7f0000000140)=@generic={0x9, "00f9000000000000080044944e08002949767e0b922cb18f6e2e2aba1e0000012e0b3832005404b8cd3a7761e8e8f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r7}) r8 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) splice(r9, 0x0, r10, 0x0, 0x4ffe7, 0x0) ioctl$TIOCSIG(r9, 0x40045436, 0x34) ioctl(r8, 0x8916, &(0x7f0000000000)) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r11, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0x0, 0x98, 0x0, 0x98, 0x98, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x4]}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000280)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:16:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x500d00}, {0x6}]}) 21:16:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x4], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x4, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x5d, 0x0, 0x0, 0x1}, {0x5, 0x0, 0x0, 0x1}, {0x993, 0x5, 0x1, 0xa9a6}]}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000c800000000000000c80000000000000000000000c0010000c0010000c0010000c0010000c00100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000730004000000000070009800000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000060b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x260) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'macvtap0\x00', {0x2, 0x4e22, @local}}) 21:16:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x40030000}, {0x6}]}) 21:16:11 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 1045.945618][ T9106] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,max_batch_time=0x0000000000000003, 21:16:11 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x5000000}}, {@max_batch_time={'max_batch_time'}}]}) [ 1046.007334][ T9116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9116 comm=syz-executor.2 21:16:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x0, 0x44000000}, {0x6}]}) 21:16:11 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x5000000}}, {@max_batch_time={'max_batch_time'}}]}) 21:16:11 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 1046.065848][ T9125] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,max_batch_time=0x0000000000000003, [ 1046.066366][ T9127] kasan: CONFIG_KASAN_INLINE enabled [ 1046.097764][ T9127] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1046.126589][ T9127] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1046.133758][ T9127] CPU: 0 PID: 9127 Comm: modprobe Not tainted 5.4.16-syzkaller-01251-gf7eefc38b845 #0 [ 1046.143398][ T9127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1046.153579][ T9127] RIP: 0010:path_openat+0x324/0x3c00 [ 1046.158890][ T9127] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 1046.178673][ T9127] RSP: 0018:ffff888197c57920 EFLAGS: 00010247 [ 1046.184745][ T9127] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888197c57b48 [ 1046.192724][ T9127] RDX: ffff88819ac98a18 RSI: 0000000000000000 RDI: 0000000000000004 [ 1046.200702][ T9127] RBP: ffff888197c57bf0 R08: ffffffff817828f1 R09: 0000000000000003 [ 1046.208694][ T9127] R10: ffffed1032f8aed7 R11: 0000000000000004 R12: ffff888197c57c48 [ 1046.217283][ T9127] R13: ffff8881cf543700 R14: ffff888197c57e40 R15: dffffc0000000000 [ 1046.225266][ T9127] FS: 00007f2a8d11f700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 1046.234202][ T9127] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1046.240885][ T9127] CR2: 00000000794428f8 CR3: 00000001c9054006 CR4: 00000000001606f0 [ 1046.248857][ T9127] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1046.256833][ T9127] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1046.264804][ T9127] Call Trace: [ 1046.268106][ T9127] ? unlock_page_memcg+0xe6/0x100 [ 1046.273123][ T9127] ? page_add_file_rmap+0x4b/0x1f0 [ 1046.278246][ T9127] ? do_filp_open+0x430/0x430 [ 1046.282922][ T9127] ? getname_flags+0xba/0x640 [ 1046.287601][ T9127] ? getname+0x19/0x20 [ 1046.291772][ T9127] ? do_sys_open+0x32a/0x7a0 [ 1046.296366][ T9127] ? __x64_sys_open+0x87/0x90 [ 1046.301066][ T9127] ? do_syscall_64+0xc0/0x100 [ 1046.305841][ T9127] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1046.311972][ T9127] ? filemap_fault+0x19b0/0x19b0 [ 1046.316981][ T9127] ? expand_files+0xd1/0x970 [ 1046.321578][ T9127] do_filp_open+0x1f7/0x430 [ 1046.326084][ T9127] ? vfs_tmpfile+0x230/0x230 [ 1046.330674][ T9127] ? __kasan_check_read+0x11/0x20 [ 1046.335790][ T9127] ? __check_object_size+0x309/0x3d0 [ 1046.341084][ T9127] ? _raw_spin_unlock+0x9/0x20 [ 1046.346805][ T9127] ? get_unused_fd_flags+0x97/0xb0 [ 1046.351913][ T9127] do_sys_open+0x36f/0x7a0 [ 1046.356452][ T9127] ? file_open_root+0x440/0x440 [ 1046.361300][ T9127] ? __kasan_check_read+0x11/0x20 [ 1046.366325][ T9127] ? do_user_addr_fault+0x6b7/0xb50 [ 1046.371528][ T9127] __x64_sys_open+0x87/0x90 [ 1046.376036][ T9127] do_syscall_64+0xc0/0x100 [ 1046.380545][ T9127] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1046.386462][ T9127] RIP: 0033:0x7f2a8ca37120 [ 1046.390915][ T9127] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 1046.410513][ T9127] RSP: 002b:00007ffed620a268 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1046.418925][ T9127] RAX: ffffffffffffffda RBX: 00007f2a8cd02471 RCX: 00007f2a8ca37120 [ 1046.427007][ T9127] RDX: 0000000000000000 RSI: 0000000000090800 RDI: 00007f2a8cd02471 [ 1046.434990][ T9127] RBP: 00007f2a8cf072e8 R08: 0000000000000000 R09: 00007ffed620b3c2 [ 1046.442958][ T9127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1046.450931][ T9127] R13: 0000000000000000 R14: 0000000000000000 R15: 00055facc785c680 [ 1046.458897][ T9127] Modules linked in: [ 1046.465878][ T9127] ---[ end trace b82b5b8d0f504bcb ]--- [ 1046.471533][ T9127] RIP: 0010:path_openat+0x324/0x3c00 [ 1046.477397][ T9127] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 1046.497443][ T9127] RSP: 0018:ffff888197c57920 EFLAGS: 00010247 [ 1046.503927][ T9127] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888197c57b48 [ 1046.512089][ T9127] RDX: ffff88819ac98a18 RSI: 0000000000000000 RDI: 0000000000000004 [ 1046.520514][ T9127] RBP: ffff888197c57bf0 R08: ffffffff817828f1 R09: 0000000000000003 [ 1046.528758][ T9127] R10: ffffed1032f8aed7 R11: 0000000000000004 R12: ffff888197c57c48 [ 1046.537331][ T9127] R13: ffff8881cf543700 R14: ffff888197c57e40 R15: dffffc0000000000 [ 1046.545570][ T9127] FS: 00007f2a8d11f700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 1046.554779][ T9127] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1046.561739][ T9127] CR2: 00000000794428f8 CR3: 00000001c9054002 CR4: 00000000001606f0 [ 1046.570000][ T9127] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1046.578352][ T9127] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1046.586606][ T9127] Kernel panic - not syncing: Fatal exception [ 1046.593658][ T9127] Kernel Offset: disabled [ 1046.597981][ T9127] Rebooting in 86400 seconds..