c6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x6af) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000240)) socket$packet(0x11, 0x2, 0x300) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000080)=""/219) 18:18:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 394.013974] netlink: 64 bytes leftover after parsing attributes in process `syz-executor4'. 18:18:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000200)={0x487a8897, 0x6, 0x12}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x20, 0xffffffffffffff66, 0x0, 0x800000, &(0x7f0000000380)=ANY=[@ANYBLOB="6a6f757226000000000000000000000000010000000000000000080000000000002f728ff4ed98244c0f7aca252b9ae5509da7c667c77ab78f51c4969936f304fda334a7c80449a9f5ac10d022762cdd27ff853819bbaa2b83938d73ab783c05b3403ba0ccf4acd8b8afec32a5db137a91ded4cf028b694895b1aa4b242b5ef690d61c6d0cdea0cb37799df834da16fcd6472580143b53c359f0c7947a8d1cde6f0927e7d1c280af9b6ad72db4f3c4f36e20e1c62a6b43e4dcdb3f989559eb70b090490e647d81ca6c7362748f0e0a7bc5530c8b"]) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREAD(r1, &(0x7f0000000140)={0x48, 0x75, 0x1, {0x3d, "05c36079e8f37d78a189050709e2cdd594281dbaf297ee56d3b6abf0230cb6b13e64b335ef8ec09fa30c75fb22f2b05c13ae0de6d6fd1b10861e602c36"}}, 0x48) 18:18:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:02 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x100) r1 = signalfd4(0xffffffffffffff9c, &(0x7f0000000080)={0x5fbf}, 0x8, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x5, 0x2, 0x4, 0x2}) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d000000000080000000fe68020000000000000000d3739e64000000d9f7684430de9f48e75e0a0909f85e49f61c3cfd91d2f3c5716f28df87264caa7105ecb9c7b49b"], 0x4c) 18:18:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB="6a6f75726c616c5f706174684b2e2f66696c65302c00d0bf90d317ad1fd0235cdd1754cd5462c7fe5bd42ff2dd4c027aa586bf63ace0e896323ffb2dc63760b0607f7d198d834195bd62b332a7c8757612ab680e921eb6fe9893ff269f4398771fb935a8b2285585ebfbb46c60cc4ab314f9bb38ffe76e92231de50630e52b03942489622721c5982188c9d1aa7c820c74cc7a90a59e578812735706cffd1c3e97fbde7cda687d29cecc20c5f5d35c6eaac6d9b2478b637519c59075ac7ca002dd50074de9cf7be014e35f83d061d289602d349d8201e463d05966ee5397d0696943d376867ff1f1c3b13db4a5e00ad0dcc7999b9a806d0d"]) 18:18:03 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0, 0x0) r1 = socket(0x3, 0x80002, 0xbc) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x10) 18:18:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xcau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9d\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfbC\x16\xcc\xeb[\xae\x13fT\xe5\x84\x99\xda\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4p\xa8') tee(r0, r0, 0x80, 0xb) fcntl$setstatus(r0, 0x4, 0x6400) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000004200)=""/4096, 0x1000}], 0x1, 0x0) 18:18:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1010) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000000045ffff696e7d781500000000f600000800000007000000402c0000000000000007000000000d00000000000064e67bfe68020000000000dc0000d3739e64000000"], 0x4c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 18:18:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 394.331235] EXT4-fs (sda1): Unrecognized mount option "jourlal_pathK./file0" or missing value 18:18:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd677336f84285b6a}, 0x90) r1 = dup(0xffffffffffffffff) read$eventfd(r1, &(0x7f0000000100), 0xfffffe61) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getegid() link(&(0x7f00000018c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) write$P9_ROPEN(r2, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0x42, 0x4, 0x2}, 0x3}}, 0x18) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000d0050000a80200004001000040010000a802000040010000280500002805000028050000280500002805000005000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f80040010000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000000004d6000004d3ff000000080300004800444e415400000000000000000000000000000000000000000000000000011b000000ac1e0101000000000000000000000000fe8000000000000000000000000000aa4e210065ff010000000000000000000000000001ff020000000000000000ff000000ffffffff00000000000000ffff000000000000ffff0000ff696662300000000000000000000000006970365f767469300000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000002100030100000000000000000000000000000000f80040010000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000000004d5000004d6010000000503000048004d415351554552414445000000000000000000000000000000000000000001000000ac1414aa000000000000000000000000000000000000000000000000000000004e234e22ff02000000000000000000000000000100000000000000000000000000000000000000ffffffff0000000000ffffffff00000000ffffffff000000ffff00000069705f7674693000000000000000000076657468305f746f5f626f6e64000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000003300800500000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004d41535155455241444500000000000000000000000000000000000000001800000000000000000000000000000000000000c0ee20eefe28f25367bf2ba3ad2ee3cd0000030000000000000000000000ffffac14141c00000000000000000000ffffac1e000100000000ffffffffff000000ff000000ffffffffffffffff000000ffffffff00626f6e645f736c6176655f3000000000726f7365300000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000ec001f02000000000000000000000000000000002801700100000000000000000000000000000000000000000000000030007372680000000000000000000000000000000000000000000000000000003303378002001004050000000000000030006672616700000000000000000000000000000000000000000000000000002c0000000100010004000000110100004800444e415400000000000000000000000000000000000000000000000000010400000000000006000000000000000000000000e00000010000000000000000000000004e2000650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000"], 0x630) [ 394.377794] SELinux: policydb version 1778203692 does not match my version range 15-31 [ 394.391609] SELinux: policydb string does not match my string SE Linux 18:18:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0x8000069a3, 0x4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x1f, 0xa27, 0x8, 0x7, 0x0, 0x5, 0x48000, 0x1, 0x5, 0x401, 0x4ec, 0x2, 0x1, 0x40, 0x9, 0x5, 0x0, 0x100000001, 0x70, 0x2, 0x3, 0xbc, 0xf2, 0x3, 0x5, 0x100, 0x2, 0x4, 0x15, 0x3, 0xea, 0x414, 0xf78, 0x3, 0x1ff, 0x9, 0x0, 0x100000001, 0x2, @perf_config_ext={0x2, 0x4a}, 0x1000, 0x4, 0x3, 0x9, 0xfffffffffffffb93, 0xfffffffffffffbff, 0x9}, r2, 0x2, r0, 0x2) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x800010b, 0x18) 18:18:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x101001, 0x0) linkat(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f0000000200)=ANY=[@ANYBLOB="9cb5"]) 18:18:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fgetxattr(r0, &(0x7f0000000040)=@random={'user.', ')*keyringcpuset^em0posix_acl_accessvmnet0/\x00'}, &(0x7f0000000080)=""/114, 0x72) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 394.418689] SELinux: policydb version 1778203692 does not match my version range 15-31 [ 394.433878] SELinux: policydb string does not match my string SE Linux 18:18:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000070000007bfe68020000000000000000d3739e64000000000000"], 0x4c) 18:18:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000207000000000d00000000000000077bfe68020000000000000000d3739e640000000673a72fb86cb053d92493ca93b0e2415f1090a64da9cd386f"], 0x4c) r1 = dup3(r0, r0, 0x80000) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)=0x1) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000002780)) 18:18:03 executing program 1: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) pwritev(r0, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x4c) 18:18:03 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x12c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sysinfo(&(0x7f0000000180)=""/214) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) socket$unix(0x1, 0x1, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) 18:18:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) r1 = dup2(r0, r0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000003040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000003240)={&(0x7f0000003000)={0x10, 0x0, 0x0, 0x1040}, 0xc, &(0x7f0000003200)={&(0x7f0000003080)={0x14c, r3, 0x300, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf06}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffeffffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb8f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfd}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffe00000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x47}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa461}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x2, @empty, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x8010}, 0x4000) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(r4, 0x6, 0xb, &(0x7f0000000080)=""/21, &(0x7f00000000c0)=0x15) 18:18:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_open_pts(r2, 0x440e43) readahead(r1, 0x7, 0xffffffff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) clock_settime(0x4, &(0x7f00000000c0)={0x77359400}) fallocate(r0, 0x25, 0xfffffffffffff801, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'teql0\x00', r3}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000280)='ip6tnl0\x00') write$P9_RREMOVE(r2, &(0x7f00000002c0)={0x7, 0x7b, 0x1}, 0x7) preadv(r1, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/9, 0x9}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000440)=""/91, 0x5b}, {&(0x7f00000004c0)=""/127, 0x7f}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/136, 0x88}, {&(0x7f0000001600)=""/183, 0xb7}, {&(0x7f00000016c0)=""/166, 0xa6}, {&(0x7f0000001780)=""/24, 0x18}], 0x9, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001880)={0xffffffffffffffff}) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f00000018c0)=0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000001900)={0x0, 'lo\x00', 0x4}, 0x18) write$UHID_CREATE(r2, &(0x7f0000001a00)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000001940)=""/170, 0xaa, 0x1f, 0x4, 0x0, 0x100000000, 0xc49}, 0x120) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001b80)={0x7, &(0x7f0000001b40)=[{0xfffffffffffffff8, 0x4, 0x4, 0x20}, {0xf71, 0x3f, 0x77dd, 0x2ab}, {0xbb, 0x6b, 0xfffffffffffffff9, 0xffffffffffffff00}, {0x8, 0x7, 0x9, 0xfffffffffffffbff}, {0x1f, 0x401, 0x5, 0x5}, {0x0, 0xc5ee905, 0x2, 0x3f}, {0x6, 0x401, 0x401}]}) r5 = request_key(&(0x7f0000001bc0)='pkcs7_test\x00', &(0x7f0000001c00)={'syz', 0x1}, &(0x7f0000001c40)='/selinux/commit_pending_bools\x00', 0xfffffffffffffff9) r6 = add_key(&(0x7f0000001c80)='asymmetric\x00', &(0x7f0000001cc0)={'syz', 0x0}, &(0x7f0000001d00)="f75a9ee4091cebb2b894645807ae2eb61dbe51f577762a4eab4144d87ac5df0b71aae2bdc22d8e9cdd675aed5084da540a6671d04218e6f79bdceb8bd5a2ea64eabf1e06ad22d79d8017829dc3b6b85737c5c873536d6e93dbb492a85316c6073d6fe874cfcf21068576771c595ed3ed22aff063a66a1900ae3620040d5ecfb46b7c6f4efe06a7e3d86cd8a467cfcada54c766c30ac8e4be21439ee81948d84cbe5d443a90d7bc3edc15e79ad9a0b4f3607071d11d31ae51cc19242708f706ba098ac565d2939b78cc68f9a6b6692c49e7d265e14c2df6ac7fc2b7f484b75625b0f723b27b3bf3a917bad00d9447adbe15385e443ef475c69040cd56e9e3c366593b87651700dda3160a9c274bb389e06716dc24f3ce3ff1681c55a8ca13301a693e3afdfaf029c45e5ec3e0863824728ba789bec77f1cd0061b41460a29e24fec0337670e29b795c6f9e3a7693c8cddf27ceab91f4e75cfd1b43f6877cec27411c96fe4035c3c6eb2e95baaf4673cf6d35b3c16f2dcf69386b4746e2a747d83b86245eb7ac32e38a98e080f1a0c99e412b762bc97f1d711bbddbd7889f2de30d7e71f2f04460921dd3e7de72c3064f775d4f75b7da91531557a28a646ec482ab92bc5953aaf539d23332672506548409e33dae582bdacbb86f61c2333e0a1b496338f0e50a626b8a056687ba093c6c85dc1bcbbcd34ddb9cab4a6b7dc5f54b095d181f587bbfbbccb1cfa75942f14ca13f05a457c985ccd97d73a844c1d490bb1974862e356e85d3a12d2eeecd2144069db0c50961c3f1866e8b85d1453f8b261d3fc697ff406a2f4731d93ae1f4c9d7b6ff39b0b29628b79761af0de1f8c84379061f4d60a012e63360c4617a585e03362bfe75a2dabe8b0f7c2d570d473ada1b618ff438179d4fbe0a2c4f305c888ea2932870360bbca149519ddb1057184a330be10df6e8e57283d7a802f424a16f59f5a729d73d9e5d670e6d0fef337a2675d49c62b9faf9ba7cd97820419da6bdaaa8f6b0053af01d3443733d0201ab4bd0e82d9eb29a084285e9a84f3fdbaf67cfcf799d6356547fb3f3f81c478e08426a2fc4d938972b9ceb24f7f579152b42107a29e26350dc8d5ef44026c9ae91d54d9552cd817112936907df1ee796731dd17789590d902671ff10757a542f7c5388c8e878c89c657d337f54da5c1120debc0173a5ef4bb96e2c2ca07777285a5d903d50a9be9cc7895169d65a367fff39b14b554c316fb694ab9ded75948c0ee1f6e60bad884f20a4773d7480d9547fe542a74df7e5f527ff03d27acedd554b48b219141b1bbf581c4f73d831a3ee263008eeadd5f553e600c67a6f14ff1b65ce065835ecfd9e28cce311bdb383aea0bfea3733ba32133354f1c3bc2f6819d93cd2095092f2f8c598fdb5352406a042c6c20ca19cbc33b5c61e5d62477d12d91dd9b2cfbdfe056438679266cb1287055591dfe7af6a8bbc834f758966ca0bc0be0e69cdc4d79d231fbfc629567b5db88512fbed8ea84d3972053b3b1d18f2dfd656d26c93bb691a3be876da7ea6b0a5586f4485bbb6943900c79eed1acf972a8df6cb59ff65ab186b3dc385e368b3c9996334851a3f8b7634fd09aea83ed73b18ae47798abac73367b1ca7caa96d8829c92bbef7d7189d58f3ffd1ec9c0547a8d25193f3d4850246f30dd0d5cb3973d0247ebd9d6b13466ff8dee81ba2a6c31af46183c0e86083a29719adbd97d4d1e9be9f4dde8c7bc2928490068baface88bc116a3b7bd1cf62e16f2e02fc7bf0a88bd00a8996aeaf9a1eea9b80557b1efa85c2a30aa885a1a6399dc660566c2e82330370ec96fb8c52db36c49245fe9cbd7b3a2e42919a5436395cb7a5daf460c96b56f529d30fd7aa575333032b581699896d309aa018b09fbf6bbd8a6af8b85aafa5c06fdfea0fe8de2fd093120caf031f78341dce52e2211425cf84663ffae93af810bdcd403228676f7dea5f920a99072eb602069b422edf4cdc18863ea1e51c9037a0772ae14932882734d0ca133c0b657b24a819d70708fe84c77aeae133368ea8cf2e8901be409bd14474851df4cd3f9895986388cdc8596448c83a29a5f2fa9b647d6e4c9cd5b76f0070558c3f0571f5a25627e8509065bd91420f6ab3db535f621160f9ce66b3d9ecd041c7496a94e425a54606cbd992b2dd3433914ef3747078fffc6ba27cb40cdb5f71d1ec888b496dea35145935ecf48825f4af4c97b27de884b4cda937fd18d71df4ddad9b74b7981ccbd560a81c885709dbaadd6b861edd46d3de76ae0ccdf4f78dd1d62462658e5dd55e48406096aba599020494ff6fd3784a0f657099af264e71f0b8e7a4c5e5955a7341d83d88c465bd4a8fac030c34aa53c4b4241a87f931891e884beefcdb5bd0451d21b952a5eb817f6b9b4ffb36eb3c42d7ce97ebaf9712157f2a01e89824c9916cec1411c4bd384ea757f1b4a2c513e9cdcac2080c879f6532443a64161f34a1b44e903409a748e818d1b1617313dffd67808d8487519689f7d8e4929cba7185590f33c136a0778ed981467ecad6d9acf649c8147cf7a07540951ba07f0f08268524078fd658ac807dd68d592225965e3c924655bf72f47d5b6e01ede9ba4417bf0855f005530e9d697da60e4e46cc65e45b43acddd218c630a00e90b752e88a0804746d2461260004d9a55f0c79ea38298f1502ecaa42568d4ec331f16ddc8038c2283f8a2abf3b6c0fecce98f56d04daa51b30b42c7c56c3fcec9dac5d5ae3741fd194e2f1e9d3be2e0c4eccc56bc9134d024c64a28a849ee3df6db989dd6d56fd9e2c41df81fb40673abfa5e866e208dc69fe7156c7c155c60e03cb3e0742b90aa6ea9e3b298471c28bdaeb41007de43c75d504d3ba74e38e4ce6098ceae706661554ff6242c9c08671a3b115bc2fd5f4d08845bbbe6c5c0919ec072e6fa7655fbe10dca71146683b20701ded5b950c4c8317f03bd4eb95ffdc2fbf4a0df6eea25fd797beeda848aecd740f5ab4128e62e242d0571a57f7fe61cba3844d984f771e10d1116367c9a5107790a3ce9b06bc115fcca643029890230339318e437e16739d38d1499eee4fbcabb6b63b75c835eb0f4d7f085cd6d0c784eb64caddace72d623a9fd759b24a0bc9d4802bc19170edd68c70c3b00810938aac9213b40983d3adf20db49f198e43a2e6039932ddf0acb46ab3c03ae2f52d2045005bb8ca36652e642e91577d58d242ae1ef2cb66c392901c1759b1c050bf5736cb861d9f9d8f1bb096531610337973d135cfc2b59e41b4ec0177b1e3c27f09d88aa7290bea0695457e0a55c45dcdccb12b082d723767ba987c1c539a92af469f529f0fd39c808cbf4913fdbd57514f439f4775877c26d7392e48e5713d315a2e70e01d11c23418e347d5e3d94e7d2ca28d3143e2079b8b087186b3fcd5559f8698da53bf0e4bf7a87926b0d915f94528df8fcad5b46c23102d5e94fcf03da6660acdea8e2e25e0525c0c61ca7cdf05cbb7caaf38f0940b3453560809b0eab32ccd0a33d605ee1247a280d899ad6f9ff496da4d332e86b048345441ddecb04510b293d204f63036df19ff2c4adfb3c625b205365dd577195ad075554469e68e90090266eb4868858205eb07efccaf7c1ca284995aa1d9f3be4b1af209efa1230daea326c043ba93947e0cc8292e8214f23f7caff565e887fc0d4f502bd25198fab86dc1381911f5f5c1f08e16267d8a87afc0733c5971956079ce077bfa3d6acc3e764debacd116398bf8096bf2d0f26feaa0b601f24a79c4a1b431fcf32a745b023496a39028783229c7feef1d55738cd22dd69042264c238d54cca0b545a89f36d67e6d259c03e20dc5a743ba643cf11a2d5c5d606106476ca404603c48828a19400a264701652ca7bb2fad2a387b66eb6800eff755aab88ab51968bca0a8d182da4853a6bbbf9181d342819a8876fb4c385c07e0058da5d766c60d02649f2ae08fb22d8b47a1b9223a27af5033cb0ebbda93e7c91ee4f655b5f32883574c1e30569e1d3e4fdbf172ea34705d92872696e171177cf8255764b8ffbd465ec7254df846e65a944ca68d54ccb90e150fa7fd83c494cab93e0d5f83c0eed57db4460dbd6000cb65222bc39fee3ae57e1ea09bf12bec3d51cd27a13ddbdbdb0cb98d0703aca018978fe7cef7888fbabfeb9f632fa6ce0b5ac0e44e7d62919e53f4c62bd2017320dee595477b021401f48937e6ac6dfa83fcc5322ae346d4851492bde1373f1e8189544e1d508d42dd58eb0fbb5d2211b1d219e6a35ba7f502b9bf14313f271f3bef0e23ef3b9e3f5201d978514daffccfc9dbdce016c032cf30fe81c936c67a2dd057d9b2393132ec082046e59fc8b2b1968bf50f2a43e89a13509818efb0a9d5eb6697772e5f9098234bd2f87d89bca3ee880055c4b81130a2b349ba68e67747a3c73f4690f3df611c74793a84462c5d73ff2d1be29936af8ca518ba646f1cfd404b33f857639d9e519a56ca971801eacf237d46b599dddc187bbd43b2b17f96c0f64b3479570a5dfffef8f9b709129890839d372f235ad153ba93fd2467bfeff15092e4dc93890f18db94969f1e5ae4b63f5f634ee70c516cc0b7be24880adbaa36512a245f49b577747d5e97392158fb4df6025f4d707d41a3ed345200c23a2a0443be924ac55a7646913217df694578028b78abec4374faa1005edfbad598c3bbe9a2875a8aa6fc2218af258436eb3417b48db6997d7b6e923986ffc60fb426b333b03ed76e11057a4bf029dfa80f8093e14c90971c4130f4debd30d13078538009d3a85642a9b7ae0f721660d67cc549aea61c9e063400376508fca1d1640f2d11674391e97a6a9b50e35e5c283be24690f9eb8fe6e4ea6fdabd68b44651b6b096577b25f770634f029eb4da2e67bc285af43426ad5915254ce1309d63b6d53710e203d8316fe10ba827c1c932692dfea016b5cb6906c36ee95206afe9b016d202ef4189dc7a600d5cb8da10b55c98d1e78f05f03a466ef48b710b4741b8e8e31cfd8adf082058e1171cdb200c1d0b1e52c11123e9194f4c6273438af0382b1d5a068abffe380e3287bcbcca4ed26df5d6cce96bdf9f39ba034fee3405b03f8235050af966c6667e5d96b90177d1de1d669f5833ea27c029bb8b27490b970da4832cdacfe92e1ab9561c5d3d910a54307020a3eb1573a839773648909ea6c4af0bd7e75f7a0e64572cf4c1af6367f0043c4bab2c2bfccaf2b440a3f822139279cdbf597c180a30cd684847155834d9c7166b1f9c669a23ad097b853c11d23efb7eebe81397b9dd9e5fc1375cfad7a60252f38b3a77be04f9b61c86eec672a451e7078a4369ba912a39806a189aa8e39418b8892f55e4f61d410f7a49b78652d41650e6105e3a4557fe427a1ddfe23c762a4c10d5b05bdafcde3b749b1ffd7d9df33f549a32f1f4e3e30181ae7fb6777a7098fd87015af8b5e0bc44b7a5e908bf200b2c23115713a708aa790f9d010e258484528b76b87a43b2bf977b4ba1e611cc08ea1d8e607e615bc35a908e8399991d2f091e44e3cf2b0825c732c664b63dd3078b2e8201a5b0e89cca7f7bc2be893cb27154cae8a0adde2cbad1638a1b23b46b23094d317716f2de105bf7a2a773c65e5665bd490f0f7a9919779dbbb4e3aabeb152461e38232f1fec5bb8e72bdda18b89ee4797f132a75c7308c0fa04b769a69574a4e25965ed0468bf1aa8b9455bd2877138442a6bd79234b06a516989eb93ee709fc923f8bc05d9a8b173aeadc84a7793696", 0x1000, 0xfffffffffffffffb) keyctl$reject(0x13, r5, 0x8, 0x3, r6) timer_create(0x1, &(0x7f0000002d00)={0x0, 0x23, 0x6, @tid=0xffffffffffffffff}, &(0x7f0000002d40)=0x0) timer_getoverrun(r7) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$P9_RREADLINK(r2, &(0x7f0000002d80)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000002dc0)) recvfrom$unix(r0, &(0x7f0000002e00)=""/154, 0x9a, 0x140, &(0x7f0000002ec0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) keyctl$unlink(0x9, r5, r5) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) 18:18:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 1: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) pwritev(r0, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x400, 0x800, 0x0, 0x100, 0x800, 0x3, 0x3e, 0x5, 0x17c, 0x40, 0x36c, 0x80000000, 0x3, 0x38, 0x2, 0x400, 0x80000001, 0x9}, [{0x60000000, 0x9, 0xfffffffffffffff7, 0x20, 0x3, 0x80000001, 0x2}], "800558572aae910dc840ec57b819fa0be8f07530ca495f90de094a15116db5640b1b6127ffde62b81f31fbbb139286d43d12f500acfbac84bd0ad3798c3eaa7cbca80e54b2a7df4e1be465d5101d54324b3f5e3d73957aa0b4406be90cfe6fc2cef6c3e4ab246297a661f3f605a0d3aedfd4eb788c3710d035016f0f6537f55e79483c3d49c4855561b37c7e59b80fdfe988090f2443ab", [[], [], [], [], [], [], [], [], []]}, 0xa0f) write$selinux_load(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000c80)="9e6fde897fdeda60025fc3fdf9c9aa99a7f07a940fb7aa828e47c823db8370a232a9ab9b9bfec65802ee5eb0e8bb5969e9f6628ba0ec97048695c86e13f15bd88291255a9df01646b24ee111c919b2343ab954794fc8827109cbece969561ac81633cc39b153ada597d6678cec56853d6f520a14ebbce42005347786ffa42ed7031ccfe55f368eec5509eb834111222fcf642b3e004323e6197e00118552e17987aecdcc19ae2e3ae0ea86b0ad623b71992669f6fc2469930cc620be3fb468f9af101ed0e856f6741963928389af7440483c84f7335561b88fe7981fb43c") clone(0x10000000, &(0x7f0000000040)="2cc6da303cf9a4a581ee6938a7da0cf441529e41f54e0d6862587cc358145536c34455ef67c9c3db9c3f2f2fee3a2ad0a6f822f7367531dd3f5bd40b2242fc37aa3af48d990a112cfc81d4965a804de6081e98", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="253a3a659ea818d1613d") [ 394.995690] EXT4-fs (sda1): Cannot specify journal on remount 18:18:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB="6a6f65726e616c5f706194683d2e2f66bd6c65302c00a707cfed75dc7d97383b5a5b735cad7a20b97ab58d6f316c17550d5fcf9009ddd1ec02c94cd11f3baf214aab40ec1d48d55c8049136a7a6b3a6d08d43786831fee30f48a7093bc92a176a181908b4a7b6318ae778c7f722b515c22bbfe29e75137e823bd9144dbcf0b170c7373c412da76d65b43eebeb5a4d6aa2a103d9539a156460890f87c5f45df27948bc3363b1e0f18f39ca44e6fa296e1004eacdee9c34ff9c4e473b612e118a63015781fa12d4c017155c0d58317fd6cb5e6a70d8f48ea"]) 18:18:03 executing program 1: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) pwritev(r0, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000080)=""/59) [ 395.058450] SELinux: policydb magic number 0x464c457f does not match expected magic number 0xf97cff8c [ 395.080120] SELinux: policydb magic number 0x464c457f does not match expected magic number 0xf97cff8c 18:18:03 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000280)={'veth0_to_bond\x00', 0x101}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r3 = perf_event_open(0x0, r1, 0xf, r2, 0x1) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x4, 0x1) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x9, 0x5, 0x4, 0x0, 0xe7f, 0x100, 0x0, 0x80, 0x109a, 0xfffffffffffffffa, 0x8, 0x26152ed8, 0x3, 0x0, 0x0, 0x7, 0x81, 0x4, 0x9, 0xfffffffffffffffb, 0x10000000000, 0x3, 0x1, 0x80, 0x5, 0x401, 0x80000000, 0x2000000000000000, 0x8bd1, 0x9, 0x3f, 0x3, 0x7fffffff, 0x8001, 0xd4, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x200, 0x9, 0xcdba1d, 0xf, 0xfffffffffffffffa, 0x7, 0x5}, r5, 0x6, r3, 0xb) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="2018ac72e201db640fa3017861b3ad45", 0x5}, 0x1c) 18:18:03 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000080)=""/7) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) syz_extract_tcp_res(&(0x7f00000000c0), 0x7fff, 0x5) 18:18:04 executing program 1: r0 = syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 395.202211] EXT4-fs (sda1): Unrecognized mount option "joernal_pa”h=./f½le0" or missing value [ 395.323248] EXT4-fs (sda1): Unrecognized mount option "joernal_pa”h=./f½le0" or missing value 18:18:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d764", 0x38, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:04 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r0 = open(&(0x7f0000000580)='./file0\x00', 0x101000, 0x20) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000500)={0x8, 0x3ff}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/load\x00', 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000005}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x284, r1, 0x0, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x868}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5c9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}]}]}, 0x284}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000004) 18:18:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x255) setsockopt$packet_int(r0, 0x107, 0x10000000000000f, &(0x7f0000000140)=0xfb8, 0x65) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0f01000000dfffffffffffffff0000000000000000000000"], 0xffc9) 18:18:04 executing program 0: mkdir(&(0x7f0000000000)='\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 18:18:04 executing program 1: r0 = syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:04 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) fallocate(r1, 0x50, 0x0, 0x10000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4(r2, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x80000) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:04 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000880)=0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003980)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000003a80)=0xe8) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003b80)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003c80)=0xe8) r10 = getegid() ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000003cc0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003d00)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) fstat(r1, &(0x7f0000003e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000003ec0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003f00)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000004000)=0xe8) getgroups(0x9, &(0x7f0000004040)=[0xee01, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0xee00, 0xee00, 0xee01]) r17 = getpgrp(0xffffffffffffffff) r18 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000043c0)={0x0, 0x0, 0x0}, &(0x7f0000004400)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000004440)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004480)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000004580)=0xe8) getresgid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)=0x0) r23 = geteuid() r24 = getgid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a40)={0x0}, &(0x7f0000004a80)=0xc) fstat(r0, &(0x7f0000004ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) r27 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004b40)={0x0}, &(0x7f0000004b80)=0xc) lstat(&(0x7f0000004bc0)='./file0\x00', &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r30 = getgid() sendmmsg$unix(r1, &(0x7f0000004cc0)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000440)="268c39361fcdb2b290374af30ad072c10f81db4f44d415b14ac1c5a687819dd5ac534c87c3c95cdd89fce5c6d596a76e329a6e45ba854e978a0ee9c051135ccb", 0x40}, {&(0x7f0000000480)="7d8fe6b6966ade1d6e55a974e8f972056e41bdb8ef4359ef3fb2e53c42a19607f4ba89a872a0438ab63b7a37c570d95f265b75b54158ab2245b431de612a097678f4f3dac1024b61626313f9d29890fe8793c374eebd9a10b3d6db518ec1c93646805c23a3f8f5360879b9b3b4140ff837f65799fb2a5f025983da1c75000a8b3a945d598ad8ff0087edd2bf7f89d63ba65802ed4365a19082b0337d29c3cf60cd2d6f81d96b9ee78eedff3bcf0adc7e624202bce28740fff8fb9d546ed9aadd45ee4ed42d09d5bb6b43", 0xca}, {&(0x7f0000000580)="057029e3145ac324b9abe2916f27d3dace5c20bd6a4e0beb409b98ce530bd6e6c2e9a8dcc6507e12cdac9f52204e6da21a3de991a9c5fd54a73cb6eef6b659d4017d2ccd5d5271c8f0ce78bb1a4d5905e4100e5716fbbc5c9dbc9b393f22b47db11ac2524565ea99ff157d439d820d879f7f5a3aa15028e9332d8dd5d6d45f0a62c253c192942c84ae40f95ba7a23c79550bdef247b0494724094833b2a6b80b854a551d80189d9c59125c011a98348355f040ab8a", 0xb5}, {&(0x7f0000000640)="93019578c914c24f496a702963a4a21c44b3a157a85b", 0x16}], 0x4, &(0x7f00000006c0)=[@rights={0x28, 0x1, 0x1, [r1, r1, r0, r0, r1, r0]}], 0x28, 0x8014}, {&(0x7f0000000700)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000780)="a896bc54364ada41ba90c60720cb3583e1d375dc4903b141c3f5bb006615eb64d9bb1fac458537b122267c8c1e494dd6d4b3c9bddccdbc710cf123ad45ffffe7e3e0442d6d312895c08ecc553fae25946f37854870ae74075d1990f67f613bb44c9a0f0501003bc2828c8c0e6886bf60532b2bac071d626323bbddf760d1fda2851ca1427496e4db53d945f03f220dc514c0f0e7b2f81deddfe8329fe8302c3fe2a8482a9762ccaf4f051c8a36ec5a7a1fb0ff9f8da11348fa19eee959a18d3e", 0xc0}], 0x1, &(0x7f0000004e80)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="30000000000000000100000001000000b4ea3192b53c12d8e5cc0e8f785621d72ba07ab81e142fefd543a6f4e947ca7306aa04a51aa219d347c495e2fb507845c9695a669c2b4c2f823b82e5fdf8ccf2c5", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0], 0xa8, 0x20000000}, {&(0x7f0000000b00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000031c0)=[{&(0x7f0000000b80)="15ba6256a4a550eea91a044435a3297ab54b5e0c2df3b7227d6129e59d27b5ae3121915ee33b2fea8b6a83be0bb351466adf4a9e8246fcf08a1ec8a65e33bface2cc31aa5f67ddc5a77dcaa13716eca3b631b62e91c3ba4a79da68d59ab40f203637fba147e70a7c0b9f6fdabe458feeaf0ce3954107a1665cfa9c3519111b65da88c99d5e216f47fab1901b6d5b3d493c4c881dcd6c9a7463df837692c289535d26661a89dafd24b7f0b8ec4829cb36508b1c1e08b2d8afab8175f949c214e56202bda7a71b83b932cc637823728221366915a02a2783523c48efde2576e3175561fc98d10f17", 0xe7}, {&(0x7f0000000c80)="e00eb1474b7f2bc5fed956fb84739c7fd2bbe1494468ea5be28aab79161d7267482d36fc88c20aac84d19dc1997933d5d1ea5137cc020198246b542c18d6e326f8e53ad37290f0ebb157660406646d6c3ef89b55b703872dd5069ee85be75464dae853a4b9f65d04f3ae367eb12b9b7c31935f13e4a914c322dadcd7c3b9315cbaad0308e638b6f6c6c8f7869530107bd6f4232ef403f50c26738cc168dd1aa895ac3b1a1156275d1456acc6a82fa74dddbcc77479a0ad5f0765152e3d9816e8fb25b906586e2eb000ab", 0xca}, {&(0x7f0000000d80)="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", 0xfc}, {&(0x7f0000000e80)="78b6727fbe96d9c8278ea52a524793154407aa59a76fee63e9d1f506c4b65660563fff8bc442cf3e46ff695e4f65fba1250290c46de9be55fa50e2f24e507023f92cf115c482dbf2b6b4ed47076628f59a23bd1bd7334a72f1598ce293775829f300c6ccfae7d3366b15ec3b976e9f3c1200bc9db365e60f6f21283aa448c754f9e50cd9d78122586e868de09a07c045fd8b010ca9d76fe7379485c38fd65a17e2cbdca7408cb43cb888171f426e0358459713c23f7680d427957b3691f859ed009f30188a129e028c8e3119de247d", 0xcf}, {&(0x7f0000000f80)="6713417c2a4649a6030b9ebbae0a8bde8dd98cd4365f79fd8cb846499116700658d6caa29799f125f816073ef26fb527cdde044f27b75c2cf2f43e6a70ec89aa132c2cc19ebf01dd856cf349ce28455582804dca9ee267dfde1c7a5077bf3d71e89437ff5de0946e5d7eb4fc2ca4d0cc506d80355e38f6a7b0ea58637fadbc1015ed3a7d883361e465eef3122e250085ef6ec3ab2e6c5b1589003152683b2ee18ef08b1dc8f71700c7f315c94ca71b46523900cb15f9a5d952ab3e2dcd90658b33fcf240e4791f4f746a2e917d2d126076eb2c4f9279e8fd09f46adf", 0xdc}, {&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000002080)="2733dbd84d31", 0x6}, {&(0x7f00000020c0)="2fc527643697dbabf23f43dd5ab247ff20a35f3ae3f46d18a6a15fa18a949da2c2f976a59cef955ea6680245f780750150aa6969684e61944cb36dee1fe58e1d1bd6ceabb2f013a449b1ef74546239fad619406e0be159f268aa9c59826a2c2eaeb2dd2299a8c9809d9082a39ece9caa2a2da04c9b1bd88413ea2264afde5e61df469fa7a99ebbd47e04570a85328ece0a45c1f6a5204b206a2a86e9b7d3247d2533558c544da6aa594a3b7c684e0f92958ce2681db4cd0ed27fb5b11915ccbe969643838f3515e68f4e9a8efb4b302e", 0xd0}, {&(0x7f00000021c0)="307f7020adc02beccbb3d703d251de15f909c1cf0a577821fc18e2baa23107a1839256d098e04a9cb7ece99b75be68a2e29b230c359df857393921a212a7291aba4a42eb76b75b5d9ae039c58c4a31c431b12c1c997209a0042de65b935aa1e69d2a33d7b8330e1ee2c0440746a631e6c913f1c20c8fcbd7905030047eaff131756fdca23dadddeb20023d1b06c9f624b301c77deba17a1273aa5bdc2ba16b0f407e3b2919e1fe3303c0aaed9d1eb9dae66aa4fbd095740075d8cccf79c26f9b0afb74fecd5f14520e5a2ce09d4ca50f0c7d68e1ecf6ce648cedffbe3022a90f79f463339203ce2b067f38b9ffe36aefac1de3994893bed6552908a3d27a92ea0233a8a52fbbf4776bd19c500e0865787b8ddfdc9377d1542fec8bc2373418fc119f7fd09f76e17eabe02f8e229a0ab81b1d3915f0c1d07171fdf55e7504c0814a20ca5b8ce091bf4d6601c8c6474b47d763ba4afa66635b692c57bc9c9ab8fdfc82054408d0b41cfd18e9f01d0602d3f4953c550f0b3624092aa54c55cec14f40c21919f5e76718098020003343d655680d4a88947df1ba46d2493c3ca9283007a86ee0248d001b9d0847fe9e241810ab30139ad082e3432b8336ab3d4887224334cb3848830362205b66e9eb50911b4dfa0e18487e4f88a6709426b7b68d131bedd65b49979327e7f7192d6ce200cba921bee3d1238572cad41be2e42c84b68bc8f567ac32b5238633886a8319193994a1ef7c243412fffd9d5f6b5a54ca5b1d9cd90046bdfebb0c021109e76b89a4505e462a2ae9b15de7f9efc224ae7c72d6cfeb47e86f76818a86cab4f50c4744118035b0eada7a20ba98963010d2de7cc74784680a26522f0e4030290d7bb0b106bd51109c81f1b035e0d38b2125a885664b66d4355aa8ed10f2c61b0bbd70a4eb63ce4eb6ee3ea0522b2333a75d5e919faaf9c140efda8c9b8098d6876e6e5ae234c408532d2d05498364db59400ab53bdf08cccedea0c6036f8b7c526f2f513534f6d8c8135b94b3505fe499dc81068a299c4cc6256a708ae48c9befadda4015e36ac2fcc3a907d143d344ced8f24149e54bd7c5cf56883274c2b9009d076a202fc3c6fd21332bfb5303012df2b4243409a0bcdc3886215a297efdb7ff63d7d8867dc6f614228ba80bc0422c907a0299b392d82df815b8dd20b3efa68e9e2990b96833daa646ccaa932a9d2e87f74a77b925656cdf52e6f156e8a539764a5a0aa62317dfdc7a811b9a02675d2577c251868ef0867dff9c91656ff5252bddc3a29f61569605cc19eb06503b1fcb3fbbc4b5bf5a2f48ad8c0753f3ea7af3a535f459f5f427a34b43b9f23c35713f6b6adce778cdd8084a2a1e327381e25b14ff4b783418d70402a9f0a9bbe04a14bf6f134f4decbf302c6515d35193287032ea14d5b231c9b7e0b143d421c94518dee2e884c48e4ffcdf461019417269e6e99d715d7f1b59a813810c6920ff0288bf4a9fec680b4a00845487613def51be0d011e4321e83b2bc02d92ef5035b344127fc4afe1c75d8a3c0982c2382d242c5c2424579764fcb36bdf8df902971b2a4529f28621156590c9cc0032fdadb648c08cec67364a997fde4f8451c142f904d168f6e3a769d4de9787832da3ead2e7cac72097b0b8da37dae796802793a4a29eb4938ee649c60c8757a0b5ba45486710503bf966a935aa6868259e8304bc59706c7d79c2001a79d35a84e91c4ab022f071282df7144ec9b9800bf1be95a68be07a4ab14d69737ff2139cb6c4c79ebbb8aad3e29d04dafed17e903906f8f18601d2950d96f221a4447b31dcaaa837b372c016ac8c17bc7d0129c974f59bb2739c247c7a294dfafa6f17f198e5726e31d9f57f95c4311fa59537a5e746d6ccd3c5982bbb90e80da69c4b111e8a40e28e8428622e72de8b06920e4c56070705166da60a702f5c33523c9e544fb3033522946559b64c1e3699bcc51f03342a9f6a6cf5958d2312821fa03978024e79425ddbaaee74aa9d7ef6694092446fcf7a4dea637bb370deb1f0f0b807496fcd2243cc2f6dfbc1c1f00cd932ebca52e9cc40b2880a615fd388879059bf0d43bd7a06b47a12a090a1dc95faeff586517a7028e442f7b61e7d914e664ae57ae7e3c0844f8319ac08e36e3f99dd1aecf2e492dd777d60923ccd4c888bd8d2842381ec96bcf62b8a01bd966de8fd6e6e121ce8a21e4ea78f7a642007a81f5b3df6d8f7c672e79cb0920152fca45fc0ad7930862da1ec44cd8284614b0aaa0af67a6f47febed96dddec5aa0ee57e01f32e8cf58c0706dac26bdc2da6a4da2288ec870eeeeb4df03898c890546d44807744eb58cf46d3352c2c2961fbaed44275cf386e9ad6c8b39b7755e3e434d3228c93701bd55dc9f5ad03b0728baffec02cb7194fcd7720fbb13176c911cd07db10ae18bf8676cbeb58f112752bad9d964e87808318dcc9eef40abf85267d615ab80503cc14c6faa5eb90a6480731c7e1c987024613bf005d9a86ef9b56c36fccb0d0e8b865f38e21100f5cef0f6973992d5323b4ba32eb377c63c7277b5f0b0765589dfda5c02396fed8a1c3769c76ce68bb9c33ed814467c9ea4c82ed987b3111ad29d64d741bd99ea1a068144104016857417ec3fd875cee2d25d8332c99be311ef6cf648d053e703d00efee46988bcc9db1f83cb818719383e793fdc9417171e297be48a1331592cd78683745ec5e0ede6bde665eaedc916f3e13cb4f2922b6e33bf59ae469747c99f8305da8e5e51b3091a90427d3fcdccaec60ebac84c420ad377aa697d7c7fea704abfcdba24cc640e16ae8ccdc67501ad47c00f7ff8dd991317729e82612c12532e18f3a04f17f9fa929a9cf65d1e0857885beab3afc28b68eb714b9e6cb84a861fe9a5243d463bda31cf528ea6ded3c2e6dbc9288204e4beff7bfd2b3914d69ac5f9080eafbdb91303e68fd615da008f66b13258bcf3380529eb231b0cfc9b1c361794236c2ef8fd9321b35b5a69a1cd89451a212a2d086907f564bc38080baf1ee50e0a9b200692db02b23ffcdee9c1667be6e2d8f6cee6c3c2a1192817939d5e80e8fbef540df620415772b0e2ec2d298227d41e725a1e6dea88522eba4c9b542c475efc89a6dd7abe1788b37534233f715cbbad90398262db00af29668a8f89315b5cf1da0b7bc1665f4881060b7376919316c1981b199a0b1cc01f883797cc02ad53a655d01ffdc5df29bb18a17191716525c9184ffbb8e7773b512e5a0f80425bd7b67b341f65c3e45a5a7fcfb7173bb922d64727c6d3983b114435effa14a0b4a38d6b7cedf08c479c1a79c0cfec2dd01db9300ef6d450563935cfe46510dacdb07555645c6665db29f4b46a94d2a24d90ee793c8484f35a966d5b5f70be7fdd53b4ff5f43b4aa241733ff447e27d3d5bf81f1a9e66d3804ebafea6805f8cf4253c964af91259cd6e896c7bb5ccb37089b0c0927aa5af883140b9afcf2ae6e9268eaa3e6710bacc3fd21108ca91f86f6e2420d7812d3c38f6b70b745422224dbe477776b59062d5c88c962a404cf65c572730f04865f4b7990a2addd91f7ebf058f6af7fd800fff5098a367b18d481f43f7e14888f79ac0b767085b825766cffc3777c22698bfa65b6091ddd201d3a0ba719c04eabcace4160da44ef1a76e5f5deef3a553e756066018645e337ba2420ad80267f94608e0fa8c82dcdeee7e0ce2034b32aa1907047b3583d276cc0fa8e7d7300be4fcdb20448e13f3a897e77c78ad629546d53d7820174401d454b87a75f5799bd5ebfb2d55d2c09990a772fe2847d3b04adcdfc0f1ac6af7acfb62b28ff460169d97d48b7e2e431e4f1745f5b74c90507bacc0e54dd7ead688538c990bc95f30ded676f69fb052dc0ab8e2e91910249a0541485028c495978abbd0906b4db465d2f1ba84785a05dff0385b761b5c7810525c8b6bd29738edb07141fbf0eca51cdecc3885223c4d6d2cf451be0f1c925f2024e9034bfeca5a9f797d327ac54b1fe85458caa8e1c93ad66527997fd81253c10112a17c266e5b866ac09fbb7760a54ef499120858abdddaf3a6777c70250467c593fb8cbc16a9e5f5f4d06973984aee28908ab98e2b24da7af1bd144f8a8202313b20d5ec7b1f652c5389a9dd2fef027068fe8c637643a32e6002b34cad387adeb064fefd7ecd88637484c9cb58b32d8fd233544e9aa148aaa83dc9d55aa5dd03e5971ac964fc6b694c1f04aee06898bae26a4c139dd1e2604151d44bcf537c2978b869cfa49abe77f64ed1383ab300d8c1971b276b25e717b005ccf188bd883cbf190dd4d5bb9ca3a8d536dbfee2c601d4bcbc9c46f818a75a687aab2b1c2d89986867334517ff1563bfd22ff4137c5c5ddfca57631e7cc1c73b89f23c00a05b2a21573f0c1987ccb17eb0b0c86ac9b5b8bbbba704477af519c62f267f5e254ef3e9aabbb05d6b1312fa7f6dc8be0bf2865b62950799015cb5e117d135bee3addeebeb4b6bfd36ae2bbc3eb054753ebf25412e7a2b7cc6c38bb168ad8283c65886c916f0b1a9bf55607adab5a4a67e73cfaaf181da4dac06605688150e02cc34844d78e821117d58538014f9e14fa2a8242a153ebd1d9442e5b4cc6744373dd633027190256236aaeab7474de7953f6746de9b2a69454221762e86a4e8759fe099c343861f182159ca400a2d0816555cb82d4750f314d2e2a96021d73c6a9f86f722949772cf4b95405631d9ec09e2a4802818ba1f5fd0e1fe8cc006c9f964c4bc86946feefdda5d5232793e581ef25adf927b5d1f0c41d332cccb38c12ab745219b52e494c4b8bcf10ab2c4334e2a6dd42625f818ed41bcc1120701bce8e2e505d25a2cefa7127e8f30b652f12e033c6877cdb48632625e379b84510425765160a1779cd5b1d787633738c942c1886f6a8f11b2de9cad55dceceb0fba0c6c127f4c57083bb033a0d6c9ca106ffc2b6cbf4ddba40cfb8c7f1567df9f7bf370ddc8fa16804e1239e7cc9f91fc5646b7a6c4bf75f7d3d890a6ad9e03f4865273efdc45cc19f7f1a8b6b64fe9ef5806056223fe01ee2767c2d997941554d2d52a4ae3d2e6bc4d5e8e1f01ae0f023fd52581f143462279552f9ce714a1f12d58236b6ce9f7cd54cdd7c720cfb4fac9cad2365bd7ae0f95d6159a631f2401fbd04bb173ed774108bbaffaa879a8ba2b872c8c01de3799dcad7c13257bb5edd060d7c2c63b697b0017f2b56ca3420b25394540b4c029bd4b5c68d9aa0932f26391793d5dbfb6d9ce0dff13dcf84c5cbbcddb2f1d1c587be440b6e15d826da82778108c59153ad20039bfb0405c5ab3bdb60ef27dd1d15e913d1cf991eeaaffdf439a0a489a8937a143a9a83b44283404bab2a62ef774320d04e5b5a9253d14702caf3e6fdbb03791832df1118843a8ab04c6339acdc7a657a3f8191d3e64f7e2243a99bface622ffa4c01669ac8e06a4758d4e74f911a3c9e1a163d3de1543497dab588472d36b94bff01a543e6289966ccf7a39f814611296ff4df5b7749d7059ab7bf99f5dcd27b72fefea6d4c3c18412d03decb3e6a55db9e495aca40e524bb1e13be9675aa592832bc79674591e7c30557fadef578cad109f1323caa0c0489fdf1c7593018bb15a9cb0c23478b1165fc58dfd90cc5d61fe131e098211d7763130cca6000ed409d0da7fc005690f651d5f4a27f0d53bf51f670c2575e079c909b04c4c7feb105a3abac3a58419c1de2800272165f1f6a0391e143cfa53c597b1c1357969449f3d49c48fcd1fe8fe5f88c19cd819e9ec", 0x1000}], 0x9, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000079b130210"], 0x20, 0x4000000}, {&(0x7f00000032c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000038c0)=[{&(0x7f0000003340)="c09fa155356488b896fb603d97e0365ca6b8a011470180a6ab74425569da85832f8ec1a5c9bb006021c52bb5da59ddf96dca375cbdf7a0b7d8534ea90b7740fc22f11428c10e6c5778bc8e3fa9ff759dc80ba5a4d0f56f4c8ef0f88c529c11b6862fa0b2e6241e2ac4a36a2a82ac0e73773c6d6c059d97558c5eec0b00cea3025336b5d277036471a1571860a89ab99524ca49", 0x93}, {&(0x7f0000003400)="b01f9ed8abcb03313b1fe2701de14ac200bfa1d7bb207532404528340e1d15fc4ee853a1d7e8d55b56d4ab52d971fddc228e02d2d69176ed9901c510a34aa293fa012789aaab5e9cb5a7a2607f", 0x4d}, {&(0x7f0000003480)="f08539ec873ff395738c045b3b3f9a517514067307394e6bd7dd72e087e17d98460c2e236c8245f29a67d40b4accb825dbccd8674abb97293408a4a98293f845bd831fc4a72267815fbf0ddfdb25de75987a", 0x52}, {&(0x7f0000003500)="ac46ad3f2d", 0x5}, {&(0x7f0000003540)="e0f7b7c503e7d29f500fa63f2066", 0xe}, {&(0x7f0000003580)="0f119f869316d6a47ce6e0c9d25fe55b2d1723a606daeff93196823a50edfc985586a6653bee125f09dd23584a7cd7242b9f92732808d1ea09a7a266c4d849860f63b74b17ff10fdf5553fc7e8707b2b7adbb50ac5315cd69299a6943d5fa17260f8b1584c4fe75a3498fde10671d3ee3a8a8f4f7305fc7399978fcf85c2b29efefa6cefec63d0eab08070aad83c41d317489308d53159842b1fa11fb7077edeb27543c6c12f0cef4c180b5405ce64eb8ce6d1612461adc1fcf3f0f19f500988089efe3703ce5d8a9781eced2d6bbd0c01318e206b15b00f4b64491d0704314430d05ea66f63b237", 0xe8}, {&(0x7f0000003680)="df9b5e524f7ddc92f8b03051539a74222b7bb9691d7e706bd435cf94dca8f33900bf08bf7f4d97c93682f4536d85b343878272712c5dadbdce1a482f59d4b619b2c91192c55356e7c72a", 0x4a}, {&(0x7f0000003700)="b8e7d7902382d8951ccc576bc776b1dc6149a3c557d8000a947bba3007a53ebafc6af307d28e154b21ea2844fabdbdaf73a4502cc4de1288977f2276fbb6796a06430b741d73ddd88bd2e01cae5f10fd413c99e3053b9429a2636c0e4604c3798469169574227c3321c76832e180fc5cb6663e8490d4e8c8a1b335e59d7c5081218d5e338814ec7ae8dbce2502fb49831c53c89b4378c206642b2d0009d960d4783083b2fed1b65f9ffc32b5a915c10fab010ceb7e876c7f9620569793f7a2a6cc44d44e3ad69deca0f3f0986bb7699fbf7252950c039ae6b6c47c9af8a151d9cf435b0e0c0ad477a42864a2", 0xec}, {&(0x7f0000003800)="eb97b9bce830050669711a30dd92c16b97db33762792a436703bebd0ae633014ea9af7144f203163cf4ce1cf3e3d66c7c082a1690a2fa1c0101c34024e47de4abba1dc34c567b8e9426344902e1eeab7ee45f6dfa019c076680e3ee45e640e158347299b56f0f59809771e4508247f4a1aa4e4a35ebb4fc1a38c5aae830d5701b9cec331ff06f04df70fd7d22d633e578ef65cfb7ce4314748c1530b813485d7841a1e6e65a55b022604782b422aff", 0xaf}], 0x9, &(0x7f0000004080)=[@rights={0x20, 0x1, 0x1, [r1, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x28, 0x1, 0x1, [r1, r1, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x20, 0x1, 0x1, [r0, r0, r1, r0]}, @rights={0x38, 0x1, 0x1, [r1, r0, r0, r1, r1, r1, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0x138, 0x94}, {&(0x7f00000041c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004240), 0x0, 0x0, 0x0, 0x4000010}, {&(0x7f0000004280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004380)=[{&(0x7f0000004300)="487b6b7e4f7d6b73c6951065e689e35f51536cd2b197dac508d22abf84941721087b1d0b21ee0819ab05a2975710439c96b95b4ba76aa71cf0ceb2b50459c929a418de6e2f5a3028b6d2dce8f1e57a5d87fc", 0x52}], 0x1, &(0x7f00000046c0)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="000000001800000000000000010000000100deff", @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r23, @ANYRES32=r24, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x108, 0x8081}, {&(0x7f0000004800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004a00)=[{&(0x7f0000004880)="7d8381718cabac3eecb958ec56a094c3124b774a96ac14d3f2edb820e0210cac6a853fcb62839d673dc824e07256ad4ee9b6e2de23865bdeacf30a6b9b3b27ea82b07df12f1e2330e4c2567f26b743dba9a99d82691ec1e8cc18de1ddb7e8df33a5d6f", 0x63}, {&(0x7f0000004900)="e9d7e4cff47f678cd51d1fbf51b178d7ba3ea82ef47ed2aa9e1a8f90ecab4da306fb526068b2ade8f285a338461f45f4bba13bbb04d24707cee49944764bbe10f87fdc41562deed5c560f0b9f605757d2723bf3eeb651fc544d12c0b1e409c698e9a0f821ec3895253ea0f7763401ed98f4da91999b6b64a9ceef765c7bd05755cf5a6d96ce14378973e0fc00ba1be4dbfc71cde88fb2db3916aba994f069c1dbe23bb0738111c9b57c122564d0c26617a364b6b8eb597b9e83dbe4907d1a0b6f39e8a1b3ac91e04e4d7b0f7a07a3a43bb", 0xd1}], 0x2, &(0x7f0000004c80)=[@cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}], 0x40, 0x20000880}], 0x7, 0x0) r31 = geteuid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000280)={0xa0, 0x19, 0x2, {0x1009, {0x8, 0x3}, 0x24, r31, r32, 0x6, 0x3, 0xffffffffffff1473, 0x7f, 0x2, 0xffff, 0x9, 0x6, 0x101, 0x78d17e7b, 0x20, 0x7, 0x3, 0x7, 0x2}}, 0xa0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pipe(0x0) setuid(0x0) r33 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r34 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r0, &(0x7f0000000000), 0xb35) fallocate(r34, 0x0, 0x40000, 0xfff) sendmsg$TIPC_CMD_SET_NETID(r33, &(0x7f0000000380)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000840) fallocate(r33, 0x0, 0x6, 0xffffffff) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) ioctl$EXT4_IOC_MOVE_EXT(r33, 0xc028660f, &(0x7f0000000040)={0x0, r34, 0x0, 0x8}) ioctl$UI_GET_VERSION(r33, 0x8004552d, &(0x7f0000000100)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r34, 0x660c) 18:18:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d764", 0x38, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:04 executing program 1: r0 = syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000002c0)=ANY=[@ANYBLOB="6a000072a4910067706174683d2e2f66696c65302c00670d821ceec04eceb3792bab975e5175930a4999ea4024da809585dd3a3bb6999ae8d83ad15160544ae71a81eb33ba56e4f2789121be0e15bd770547fbe87fdee14bcc81f14a0205f21d4320d30000000000000000562ddf5c3c1960c5b6a59d97139a69b2830736c9bbe34d360641a6f98cb9cfca890a6e3a7d898a6ce27aa5e5aca5de48a38cbbefe9134795db13a62156c37ba542c1f6bd7a29a56419471ab2358364cb2c1f947e91dbae55fda73e30d2c146b5b80000"]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) dup2(r0, 0xffffffffffffffff) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000180)) [ 396.016992] sel_write_load: 39 callbacks suppressed [ 396.016997] SELinux: failed to load policy [ 396.035037] SELinux: failed to load policy 18:18:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$setown(r0, 0x8, r1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000700)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 18:18:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:04 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="a102b9ba51ef252ddb9bda3f74ca20842842dda029dc3b05984ea357dc3599ca38512797666c23f02b18d6f38a95ebed61a1892424fd1ea2679ef502c8a50e1d14a642e95a2b5e71bbebb2cffeeaf2ba499ad45c30dfce114573ad679ba914e5f4ee3664bfe963d8cd5e8996f77bf01b9250c743ecdb661436db2be0777451ba062339967faa5cd2c027fd1c2a944e4e887df16eae85c0b6b69011b95cb56265566c862b0926f5dd98b79ad0372eca3a881d83b453853093793bd91bb9a4ebfe1c52762f4c9d2062d17f06db0ec6bcbb86f047b8a29f835b8320c3ef660cbc335098f1316fd307"], 0x44) 18:18:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d764", 0x38, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:05 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000840), &(0x7f0000000880)=0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)={0x0, 0x0}) r1 = getpgrp(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) fsync(r3) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r1, 0x201, &(0x7f00000001c0)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$int_in(r2, 0x5452, &(0x7f0000000580)=0xe2e) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000, r1}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0x10) ptrace$setregset(0x4205, r1, 0x3, &(0x7f0000000380)={&(0x7f0000000680)="2a118ffa87db273dae83a284988593a5ffb540c83125972fc03a8d0ec5ec5ad60ac810819820c770ac79d139d6175978c639fe46dc9053e60f3e6a6bb63bc6a96d3bd67ba0daa78334d4e91683237746bfd5ec01663da8187cc39189f7ed1c69eaf07b491c25cb14607620d8361f1617c79ae4e57e8da998763caf7d0c4cb0438826b90061b360638b1af62445f65c7a30b3d6e5d20b36718427e9", 0x9b}) io_setup(0x20, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) io_cancel(0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000180), 0x3) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) read(r4, 0x0, 0x396c552dd16f47) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 18:18:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449", 0x54, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 396.248220] SELinux: policydb magic number 0xbab902a1 does not match expected magic number 0xf97cff8c [ 396.274692] EXT4-fs (sda1): Unrecognized mount option "j" or missing value [ 396.280859] SELinux: failed to load policy 18:18:05 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x4e24, @broadcast}, {0x306, @random="a85fb942e3d8"}, 0x44, {0x2, 0x4e21, @multicast1}, 'syzkaller0\x00'}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f605000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e6400000062de6257cfedb713e872af3f42eba6bcbb1398db085e625a77c6cf64693b4745fc5942aa4b2b2c41594e5fbf21a23f79aa652db9beb6aa958b9df6597718b3913f3e651af11743c336bc5955888f139e9d9b482ccac75f93085f73e24f07824745c24af691a6e4ce8557c5a50c97b46db2f0e0d837"], 0x4c) 18:18:05 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x1004200, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000240)={0x2e, @multicast2, 0x4e22, 0x3, 'nq\x00', 0x0, 0x0, 0x42}, 0x2c) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000140)) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "786dcce350be93de64797374f3f995c5cb76b3fecdf913afe980e9bf4b94d89a64f2d27daf3d84987f9330afc0ee0c18aa6eaff6e1af214768168869ab654ed2207a31884aa458c8bd5fa8cbbee7be3d4906d06792a2c0d7bac5bf8f97c3c5fe276c0802c5abc007e14e3fc180d6bb6e88b618ffec7401c9a3bedb690c8422261bc20ac8563fe4f3d7b43bbc828320cd8f25ca40e3ac04e67d307e7b3b5bfce1b443cae955fb9b57d371c6a28ea71a6f8fc7d9099d6b19aeaa2f5aa9846d5e829e338889a9cd54ec83912702da8145094aed53df5e9cd48f3efae4c88190bf66d058534df0aef065ebe848ecaf70"}, 0xfe) [ 396.361779] SELinux: failed to load policy 18:18:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 396.389152] EXT4-fs (sda1): Unrecognized mount option "j" or missing value 18:18:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYRESDEC]) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000100)) 18:18:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449", 0x54, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 396.448973] SELinux: failed to load policy [ 396.458101] SELinux: policydb version -473141896 does not match my version range 15-31 [ 396.466945] SELinux: failed to load policy [ 396.491032] SELinux: failed to load policy [ 396.614737] EXT4-fs (sda1): Unrecognized mount option "18446744073709551615" or missing value [ 396.715064] EXT4-fs (sda1): Unrecognized mount option "18446744073709551615" or missing value 18:18:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:05 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400000, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449", 0x54, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x16, 0x0, 0x3074235c) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) fcntl$setstatus(r0, 0x4, 0x42803) 18:18:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 18:18:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='journal_path=./file0-\x00']) 18:18:05 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000140)={0x2, 0x1, 0x8, 0x64, 0x1}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "8ced83e9797959481b12b887b46534293c535d9df176b5564382a340aef60c6f4daaa6e0fd97f4d53fcd790062b10597161d294fa0d820207da8d3b3caaabd3f8a8b67b4b922269037bd1e33613c460afa35fc5f42a7aa79c6ea2b4842132c2ab76cf53b0666bd17cc58c4b04a06af33141a09beaf644a618b6c16c98b06a430fd2b8ac815e88d59a3ea23d0381035850d0ba65885f089dfa164c72389d94c764f285b443b50e5f5a84035aa50c42bf9f80e242ce35df802a47349c849922837b51890"}, 0xd3) write$selinux_load(r1, &(0x7f0000000380)=ANY=[], 0xffffff7d) [ 396.944886] SELinux: failed to load policy [ 396.961860] SELinux: failed to load policy 18:18:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:05 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ppp\x00', 0x1, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000000c0)=""/177) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000080)="ea082bb504cf374d", 0x8}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040), 0x4) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 18:18:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4", 0x62, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:06 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0xffffffffffffff03) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7, 0x5, 0x7, 0x7, 0x3, 0x3f, 0x8, 0x91, 0x40, 0x13b, 0x8, 0x7fff, 0x38, 0x1, 0x3, 0x1, 0x6}, [{0x2, 0x5ff6, 0x3, 0xff, 0x1, 0xffff, 0xffffffffffffff7d, 0xfff}], "4ed26a1ba79735a708ad2df29c089c7b5c013bc2ca697dc924b0a6413d77974185bf3e2e64dd4df92284ad118f63521ed27c5ff77622b01f23e2637dc81978ed38be642e916e64ea0e7eb5281943cfed829e7a2582650a0212fb16d332300b2d8e3e9c5e308ffa006afc56008f37f590bb210e125c1a268d1287e9be1be25bacb2316edfba41d0fc73"}, 0x101) [ 397.243063] SELinux: policydb version -377229940 does not match my version range 15-31 [ 397.263953] SELinux: failed to load policy [ 397.269748] SELinux: policydb version -377229940 does not match my version range 15-31 [ 397.373496] SELinux: policydb magic number 0x464c457f does not match expected magic number 0xf97cff8c [ 397.424853] SELinux: policydb magic number 0x464c457f does not match expected magic number 0xf97cff8c 18:18:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) fcntl$setstatus(r1, 0x4, 0x46c00) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f75726e616c5f996174683d040066697265302c00"]) 18:18:06 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) r1 = accept4(r0, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000200)={@empty, 0x0}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10040}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@gettclass={0x24, 0x2a, 0x300, 0x70bd2d, 0x25dfdbff, {0x0, r2, {0x1, 0xffff}, {0x0, 0xffff}, {0x2, 0xffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x0, 0xffffffff, 0x0, 0x94}) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) write$selinux_context(r3, &(0x7f0000000080)='system_u:object_r:useradd_exec_t:s0\x00', 0x24) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 18:18:06 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000140)=0xe8) ioprio_set$uid(0x3, r0, 0x2) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f6000008003c2b045e14dd18960000e60000000009000007000000000d00000000000000077bfe68020000000000000000d3739e640000"], 0x4c) 18:18:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4", 0x62, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:06 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4040, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x2, 0x1, 0x2, 0x0, 0xf}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000040)=ANY=[@ANYRESOCT=0x0], 0xfffffe89) 18:18:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4", 0x62, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 397.712834] SELinux: policydb table sizes (725352456,-585867772) do not match mine (8,7) [ 397.730534] EXT4-fs (sda1): Unrecognized mount option "journal_™ath=" or missing value 18:18:06 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x10000, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000001c0)={0x9, 0x3, 0xfffffffffffffff9, 0x2, 0x2, 0x200}) mkdir(&(0x7f0000000040)='./file0\x00', 0x85) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$update(0x2, r1, &(0x7f0000000280)="c365dd0979800ce91d9002d5879d19292b22908991c7538ae2c46b29bbececeb36499476da513ec0f8fb983a813ce9de965c199112a80e2a8ba0bb7684a0a41c6e413ea542947988dd4d8a52b40355f6afda7a55645d9904a6a788f342456c4d471f26ef1e399c10395b4ac2f0e0a5177d7ce72936248128ee7000489bd0d5af4e9ca7815ef803e9ccc8c4d24125247d1202bc8143d8364b2bd200b5475fca994d068316bc99bf8e6523fc0e9936336f415757b2675dce0c8058950e47a114", 0xbf) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000340)=ANY=[@ANYBLOB="496f75726e616c5d6b052385e9e0302c00d64b2e6434dd70485b8bb7afeb00000000000000bbd8a048000dbba2034e73021515f71bf29ad50d40d57e4c666dcd08d54f6cdfc7f78e8bc1e6ce64d739c97acd1b364d54bfc6c3352bf2434a5bc0ab7f4e76f2f22d9130d64e46a5db492e337822c5ed1e63847b08bf6f5a4b9be57a8ace"]) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)=@random={'osx.', 'ppp0selinux)#md5sum*\x00'}, &(0x7f0000000440)='/selinux/checkreqprot\x00', 0x16, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/43, 0x2b) 18:18:06 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d01010000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:06 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000240)=0xffffffffffffffc9) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x1, 0x1}, {0x7, 0xffffffffffff6216}], r2}, 0x18, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 18:18:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) fcntl$setstatus(r1, 0x4, 0x46c00) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:06 executing program 4: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)) wait4(r0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x6, 0x40) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000080)={0x7}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)=0x0) ioprio_set$pid(0x1, r2, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:18:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:06 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x2) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x238, 0x0, 0x0, 0xb8, 0xb8, 0x0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x3, &(0x7f0000000080), {[{{@ip={@local, @local, 0xffffff00, 0xffffff00, 'yam0\x00', 'ip6tnl0\x00', {}, {}, 0xc, 0x1, 0x62}, 0x0, 0x98, 0xb8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xc8, 0xe8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6db, 0x1ff}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345314c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95", 0x69, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x111000, 0x0) futimesat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{}, {0x0, 0x7530}}) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000200)='net/ipv6_route\x00') r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000100)={'bond0\x00', {0x2, 0x4e22, @multicast2}}) 18:18:06 executing program 4: mlockall(0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x400000) write$cgroup_subtree(r2, &(0x7f0000005640)=ANY=[@ANYBLOB="a3"], 0x1) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0xff, 0xfff, 0xb5, 0x0, 0x3, 0x10, 0x8, 0xf399, 0xff, 0xa73f, 0x8, 0x7c00000000000000, 0x3ff, 0x100000000, 0x0, 0x757, 0x7, 0xfffffffffffffffc, 0x8, 0xfff, 0x8, 0x5, 0x80, 0x9, 0x800, 0x3, 0x3, 0x7fff, 0x4, 0x7, 0xfff, 0x6, 0x5, 0x4, 0x100000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x84, 0x80000001, 0x1ac2, 0x7, 0x53d, 0xffffffffffffffc0, 0x40}, r4, 0x9, r2, 0x1) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) 18:18:06 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x3) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = getuid() ppoll(&(0x7f00000000c0)=[{r3, 0x100}, {r2}, {r3}], 0x3, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240)={0xf89}, 0x8) fchownat(r1, &(0x7f0000000000)='./bus\x00', r4, 0x0, 0x800) read(r3, &(0x7f0000000180)=""/19, 0xfffffe47) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/access\x00', 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000024c0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}], 0x5}}], 0x1, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x3e9b8) write$selinux_load(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000005e8a9153a08f5d367d0aceab89fd3cc0800000007000000402c16a141fd546ae9da72d25486616beb731bfc0df08734c0000000000000000000000000089e405b6ce8e2b60000077bfe68020000000000000000d3739e64000000d2749d0a697cb923565e8e6c4447dc672ae701293be9eb03091f79c6d9f3e1988d9cff86b80f14e093e69bf3b6b2"], 0x4c) [ 398.198652] SELinux: policydb string SE1Linux does not match my string SE Linux 18:18:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:07 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x1, "fe1db363eb2a9eda"}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) [ 398.400956] audit: type=1400 audit(1548526687.140:61): avc: denied { map } for pid=12620 comm="syz-executor2" path="/root/syzkaller-testdir215377218/syzkaller.pooI6t/119/bus" dev="sda1" ino=17358 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 18:18:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95", 0x69, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) fcntl$setstatus(r1, 0x4, 0x46c00) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95", 0x69, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:07 executing program 0: setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x4}, 0x28, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 18:18:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:07 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:07 executing program 2: r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000080)='\x00', 0x2) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070017b0000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82e", 0x6c, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@broadcast}}}, &(0x7f0000000280)=0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x83) write$P9_RREADLINK(r0, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x2) 18:18:07 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/load\x00', 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20040, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000180)=0xfff, 0x4) clone(0x10200100, &(0x7f0000000040)="2addbcd08a57f66b6ff8db0cf17d7f338900efe64e6404edf37e16282c5b24cfe9bac0b15a440ee7ef52bc0d8c75c271abe55c62c5a1e8199a790db87ffbbe52c44a130b2024cdf772569e9a6d49df61e1720f83a1f7314d5fa13c83a679a056e8e83d37ee669d12ffd4901027b13d91bfb2d8f31217c37e0a4f849ad962dc4793be85739eb1dd8a3b8560ec826081deb594863960cc907216622d10b8fe71c4297040f351e8d814df120492051d01e42b083b8120c0e2fcba3914e7c85cb7c54c4494545cc99f3b9c353399a1f52e9ec39d8d344d74026aa89945f89f7a83e825312a6bb1c6", &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="adcd70beec36beb3e38170d6809a4c277ce9f4ba6a3d5e538cc30ffc56ff3573f843ed871512b3971f7ac0a910dffc953dee5b64882a43b05f79e61ab46e8060c7d71f6e40a9c63b16cb3b7860583fa0a95e57d75ded065825ec22435d50ac1316fe32ada5eb0f8ff937bca449184211fe57c25bf645cd1fc3ce67cc4c81d30d38fc7ed03d2065e65aeb5151c7b1d9a5969a8699") [ 399.116468] audit: type=1400 audit(1548526687.860:62): avc: denied { module_load } for pid=12684 comm="syz-executor2" path="/selinux/context" dev="selinuxfs" ino=5 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=system permissive=1 18:18:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82e", 0x6c, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f001000000000000074683d2e2f66696c65302c00"]) 18:18:08 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800f6ff06000000752c000000000000090000ffffffff000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:08 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x75, 0x8) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff00000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe680600d3b88a7b000000d3739e640000004ea4c778921e25c1aff8a2902e54e100f81d18eae3c94a9622172c068c2a776483448888cdcd762b620f142f1bf094a617a47b46a819d882a7e0"], 0x4c) [ 399.490608] SELinux: policydb table sizes (-655352,6) do not match mine (8,7) 18:18:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f757212616c5f70610d083d2e2f66696c02000000"]) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000100)='journal_path', &(0x7f0000000180)='journal_path', &(0x7f00000001c0)='vboxnet0ppp1-\x00', &(0x7f0000000200)='}trusted$security(^\x00', &(0x7f0000000240)='journal_path'], &(0x7f00000003c0)=[&(0x7f00000002c0)='GPL\x00', &(0x7f0000000300)='journal_path', &(0x7f0000000340)='journal_path', &(0x7f0000000380)='%\x00']) 18:18:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82e", 0x6c, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:08 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f00000001c0)={0x7, 0x1b, 0x2}, 0x7) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000140)={0x3b, @multicast2, 0x4e22, 0x1, 'sh\x00', 0x12, 0xb70a, 0x34}, 0x2c) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f60000080000000700d400402c00000000000009000007ec0000000d00df44f5a75e74300000d355bfca98fc3994214db9f7e1174100000000077bfe68020000000000000000"], 0x4c) recvmmsg(r2, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/12, 0xc}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000000340)=""/199, 0xc7}], 0x4}, 0x49e}], 0x1, 0x10000, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x18, 0x11, "56ec1aa969140b53c195a6eb88a8cfff084906989ddd0cc5c48c002e7c43370ad57fefd2232b71f0ca190fe869cebd2b8b1ac75adaf93e0710d8313d5ee15f20", "2d544387c3402a60d3590262f68033f7e27d185a9280b9184589e3bbe54baed4", [0x100000001, 0x6]}) 18:18:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 399.675858] SELinux: policydb magic number 0xff8c does not match expected magic number 0xf97cff8c 18:18:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:08 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x430001, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000000c0)=r1) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) prctl$PR_MCE_KILL_GET(0x22) dup3(r2, r2, 0x80000) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000000000000000000000d3739e640000000000000000000000000000000000"], 0x4c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x10, &(0x7f0000000180)={&(0x7f0000000100)=""/111, 0x6f, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r3, 0x4) [ 399.840933] SELinux: policydb table sizes (8,13893639) do not match mine (8,7) [ 399.852789] SELinux: policydb table sizes (8,13893639) do not match mine (8,7) 18:18:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x200200, 0x0) accept4(r1, 0x0, &(0x7f0000000040)=0xffffffffffffffa4, 0x4) 18:18:08 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x916f133f5929a356) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20000, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) getsockname$inet(r4, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000300)=0x10) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000480)={0x7, 0x8, 0x0, 0x2}, 0x10) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000240)='veth1_to_bridge\x00') ioctl$int_in(r4, 0x5452, &(0x7f00000003c0)=0x100000001) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @rand_addr, 0x8000000000000000}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, 0x0, 0x0) pause() ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000340)=@generic={0x1, 0x7, 0x4}) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) r7 = getpgrp(0x0) fcntl$setownex(r6, 0xf, &(0x7f0000000380)={0x1, r7}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000440)={0x0, 0x0}) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) ioctl$sock_SIOCGIFBR(r5, 0x8940, 0x0) 18:18:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) sync_file_range(r1, 0x0, 0x0, 0x6) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 18:18:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:09 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f757267616c5f706174683d2e2f46690400002c00"]) [ 400.505229] EXT4-fs: 3 callbacks suppressed [ 400.505238] EXT4-fs (sda1): Cannot specify journal on remount 18:18:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 400.804890] EXT4-fs (sda1): Unrecognized mount option "jourgal_path=./Fi" or missing value 18:18:09 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4002, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cb9080000005345204c696e75781500000000ff00000800000007000000402c00000000000009000007000000000d76ac9d53020000000000000000d3739e64000000"], 0x4c) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) 18:18:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000100), &(0x7f0000000200)=0x4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 401.074870] SELinux: policydb magic number 0xb97cff8c does not match expected magic number 0xf97cff8c [ 401.076321] EXT4-fs (sda1): Cannot specify journal on remount [ 401.103964] sel_write_load: 23 callbacks suppressed [ 401.103969] SELinux: failed to load policy 18:18:09 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 18:18:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 401.116370] SELinux: policydb magic number 0xb97cff8c does not match expected magic number 0xf97cff8c [ 401.127502] SELinux: failed to load policy [ 401.133618] SELinux: failed to load policy 18:18:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/bnep\x00') r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x220, 0x70bd2c, 0xdf, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 401.184500] SELinux: failed to load policy 18:18:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:09 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x140) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f00000000c0)=0x5, 0x4) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x2f20, 0x1f, 0x5, 0x9, 0x43, 0x3, 0x3, 0xd, 0x39f, 0x40, 0x15, 0x8, 0x4, 0x38, 0x2, 0x9, 0x2, 0x9}, [{0x70000000, 0x6, 0x0, 0x9, 0x4, 0xbb1, 0x80, 0x2122}], "9697", [[], [], [], []]}, 0x47a) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cec33e8d2bf314dc37751ddf9080000005345204c07000000402c00000000000009000007000000000d00000000003c58cca27fa300ba000000"], 0x4c) [ 401.208678] SELinux: failed to load policy 18:18:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 401.350626] SELinux: policydb magic number 0x464c457f does not match expected magic number 0xf97cff8c [ 401.395169] SELinux: failed to load policy [ 401.407443] SELinux: failed to load policy [ 401.412680] SELinux: policydb magic number 0xec7cff8c does not match expected magic number 0xf97cff8c [ 401.426434] SELinux: failed to load policy [ 401.434801] SELinux: policydb magic number 0x464c457f does not match expected magic number 0xf97cff8c [ 401.446007] SELinux: failed to load policy [ 401.475141] EXT4-fs (sda1): Cannot specify journal on remount 18:18:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:10 executing program 2: write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9084c698e75781500000000f600000800000007000000402c0000000000002c00000700000000077bfe68020000007ada9b2991cbd57cd373da71641a1600000000d3739e640000000000010000000000"], 0x4c) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x400000000000120, 0x0, [], [{0x7, 0x65, 0x8, 0x8, 0x81, 0x1c}, {0x3, 0x2, 0x80000000, 0x0, 0x0, 0x60000000}], [[], [], [], [], [], [], []]}) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x102, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c0) write$P9_RLERRORu(r1, &(0x7f0000000080)={0x1b, 0x7, 0x1, {{0xe, '/selinux/load\x00'}, 0xf7}}, 0x1b) 18:18:10 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 401.552911] SELinux: failed to load policy 18:18:10 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB="cc2a5d746d561d0593a0bc47fa3256e19b6b0fb6a7bede8c4c3a9544127dc77e370e4417df9cc01bc056b1d6680d8a0bc3415fc54dc01599766c0fb24f988a79477d9d175397ac984483d76fa12ce3f099a50dfaa170891935007aaaa920c71f33b757e15fd935a1fecefcb80a401c16b8016cb0b296f46ca6218539a65e534ea9e9", @ANYRES64=0x0], @ANYBLOB="47df52307625f349072f511dc7a6b6f02891", @ANYRES32=r0, @ANYRESDEC=r0, @ANYBLOB="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"]], 0x8) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$setperm(0x5, r1, 0x20000000) 18:18:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000140)=ANY=[]) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000100)=""/110) 18:18:10 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:10 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100010000000000916fd4bc05000000000000000800000065f08f08fbde0d7a8ab5f66c64ac651249fbf753ce026d551b262823723b520835f9748fb3126daa4cadfe67a0c99e85fd69bbae67693fccfc5b04cd085260b6", @ANYRES32=r2, @ANYBLOB="00000000000000000100000000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="00000000e45b00000000000000000000000000000000000000000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000050000000000000000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB="00000000000000000100000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00000000ff0300000000000000000000000000000000000000000000"]) fcntl$getown(r0, 0x9) [ 401.754854] SELinux: policydb magic number 0x20000240 does not match expected magic number 0xf97cff8c [ 401.771442] SELinux: policydb magic number 0x20000240 does not match expected magic number 0xf97cff8c [ 401.787518] EXT4-fs (sda1): re-mounted. Opts: [ 401.865894] EXT4-fs (sda1): re-mounted. Opts: 18:18:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:10 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:10 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101003, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x15c, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x77}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xecf492c}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x5}}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x800}, 0x20008001) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r2, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x4000) 18:18:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000180)="0019d85fb0e76700c9aaeb1f9a16e8606992334bfa57a82e721a85988fec5ca2e4bf10d0a856fa2aebbe5c181a1bb4ba5440b5d8b8d37c96de51b1bb56ae269d56557091a86528558f0e45f8edc0302564da815893d4098bf3f7f23622467584673e2b53dff74eaed7ca16bb3cb793e388fe99ec6c09e5433f8c71a56134152777d85e561d1a631878f5d9590ca194ce646f4f428211229bf2ecc704d5e78c2a7ec26a606549d3e906eeffbb92f65e96bd23607f", 0xb4, 0x6}, {&(0x7f0000000240)="4e03e15cdee68f405e8676730a3c43d702825732ee553aa0e6719ddccaf3e7a52808256a20d68aa6df552ae48b9974f6b557a643ef8832d9d7fa532df1d665df27ca2b06a6741f37815e5ca7ea7d7a4228db7afd8ed6c76bf36e3fd64f07a2718542103da2b074f41631bb2bea261bf2206d59237c86ae4d3677b8e5fbcaa644ba3d3ff56ee489cf6e073c6b88931e97496361a18e8ad4d50c6026a8ed126b5c8a50246c2965bd9a1717df110e17f6b2686dc8d758e2186cc7f46f80145bad9d4206cecaa023fcbb059d2561d07fa17b855d67edc2fb62aeba73", 0xda}, {&(0x7f0000000340)="7135b3aa6979470ea2da95e51b1250bc7a95ca7e9f7b6c6662cb26a6f6", 0x1d, 0x6}, {&(0x7f0000000380)="9d39f5b212f7398e5c56fed727a6c07023690b397de1cbf359e8a56ad0aaf85903b1c44e3359aad9bf4d480d4987de560706ca4f68dffb7930d4ed44c85fdd79f3388d317056d0df87ec81c73b63441efd96f87e30720e7ca5554158db59189555cf13f98bb3b17e432d8fa7f166acc81f5b018e2c605bc2ed900697dddbad2be0f403c251e8eea590acd172715c9a16e414d34054e011141fd58ccbd97a15a1a7633385", 0xa4, 0x7fff}, {&(0x7f0000000440)="3885d6bc9809956fbf0d83289d8e4154ca6abb17f2e8151eee996bd3b8c5b75dbb891fe0d9d573d91abb4021315cd233840443176bf3571f9cd36da1be5a66dea25a1784ead2dae2ab6588dd0e487203ef1a31bdcbcf4c5db07afd710c95284d9bb02fa2372662bbf73a781acdfc600b3cce384882c02954e1f944e83242b20b64795cc952f4465f55f49cc687511ef4d5b15d19726630993bc80267308f7f3b26", 0xa1}, {&(0x7f0000000500)="338545b7613a85a897412a", 0xb, 0x2}, {&(0x7f0000000540)="4ac07c58c3b00d486ecff6b58496677da565e85597cc5c878252c53b56b811ecf537e4465e3e20cb365db9ccfd157fdac40b70d39b9d77020e361b95319cfcca8f8f61fd6845d708eb681357a2c4ca182e150883cd07dfdb354bb1ae3a509aaa339f1bbefb9b7846f16a642960ce03ea6412187303f753296da8af47", 0x7c, 0x3}], 0x8, &(0x7f0000000680)={[{@nonumtail='nnonumtail=1'}], [{@smackfshat={'smackfshat', 0x3d, 'journal_path'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0({'}}, {@measure='measure'}, {@seclabel='seclabel'}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x2a}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='jo;urnal_\x00\x00./file0,\x00\x00\x00']) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000780)=@ax25={{0x3, @null}, [@rose, @default, @bcast, @netrom, @default, @netrom, @default, @bcast]}, &(0x7f0000000800)=0x80) 18:18:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:11 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345208f4c1b0e02d93e5726063dacfa4ccf7732091500000000f6000021402c0000008100002185acc6abe5c1ba020000000000000000d3739e3c370000000000000000"], 0x4c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000080)) 18:18:11 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acda"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 402.395290] FAT-fs (loop0): Unrecognized mount option "nnonumtail=1" or missing value [ 402.416741] SELinux: policydb string SE L does not match my string SE Linux 18:18:11 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000500000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3dbe22212472bcdb8f4d6b89dc3de013aba756c30fff9137547222f9180e45598ce2c94ac70280c9ba063420e3b8d5c486fc89757f6da15a85992feaafe729f80c4318215a861cd25196a874aff328e5500432b3068077ceda5b10ddfd32dd61cec40cbe02fdb16637bb1b835aa4324e09bf4191ddc6ca9f5c1df76b72011772325356eef03725f26b19fc321e518d2fb079e619fa8b6a2ac0f985c3cf77257a2ee5b2be98f8e0f9e18e8409b411736d72a76d67fde235f2f34e72740f54d18660f8fed50929eb69c9e22bc6a17a2188e67005aac7f0101b5c729e6afff0439447d18dabda612ad38820000000000000000000000"], 0x11) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) 18:18:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) [ 402.447940] SELinux: policydb string SE L does not match my string SE Linux [ 402.673735] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000009, [ 402.722988] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000009, 18:18:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:11 executing program 4: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:11 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x9) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080100005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 18:18:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acda"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c, 0x80800) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0x7, 0x7, 0x340c, 0x5}) 18:18:11 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/load\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010000000000000002000700", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r2, @ANYBLOB="040001000000009c962dbe00", @ANYRES32=r3, @ANYBLOB="10000600000000002000060000000000"], 0x3c, 0x2) r4 = open(&(0x7f00000004c0)='./file0\x00', 0x40, 0x16) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000500)) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r4, 0x50, &(0x7f0000000540)}, 0x10) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) [ 402.826935] SELinux: policydb string length 264 does not match expected length 8 [ 402.836801] SELinux: policydb string length 264 does not match expected length 8 18:18:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acda"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef555}]) [ 403.166773] EXT4-fs (sda1): Cannot specify journal on remount 18:18:11 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[], 0xffffffffffffffbe) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0x0, 0x9, 0x40, 0xbd07, 0x5, 0x381}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r2, r3/1000+10000}, {r4, r5/1000+30000}}) 18:18:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 18:18:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f591"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:12 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "217005bf36fa433f9bba849e9201ad7bab6a646d452eeb755c75fe87fc06cd227a044f8c1996650f441dc91bed528d69b111f5ff2bd776ea4ef85557b1670ef8b7b2645b4ed437ca79f08edf7bbebb2994b6e60e12e80dfa28cc67278dd457a76c76ee1fc865603e53e0b2b1aa5deb68427d5a78442f10f80c50de529a39de2d175e74547c419c12124eaaca4c8084eb4fab92e45d37417713"}, 0xa9) 18:18:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:12 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="6a08000000616c5f7061969283852f66696c6530d9aa796fe4d0b9d8c1"]) 18:18:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:12 executing program 2: write$selinux_load(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 403.524917] SELinux: policydb version -1090162655 does not match my version range 15-31 [ 403.558285] SELinux: policydb version -1090162655 does not match my version range 15-31 18:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:12 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:12 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f60000081600762c0020000000a0e7e0bcfe2b8e26000d00000000000000077bfe68020000000000000000d3739e64000000000000000000"], 0x4c) 18:18:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:12 executing program 2: munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="8cff7cf92d6037144bfb080000005345204c696e750900400007000000402c00000000000009000007000000000d7bfe68020000000000000000d30000000000000000003fcdd3c71aed092e9687b891044ae978a8b8cc3e258880e1b740f03a03902994971874d0"], 0x4c) mkdir(&(0x7f0000000040)='./file0\x00', 0x100) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x24800, 0x0) pwrite64(r0, &(0x7f0000000380)="be3c04253bfbbf857505cc66bece7680b26c17453fab6ea2f8cd874a8d3e00e61e19fd7980dde858f217803835f84dab9d46e38300c96a17632abe1ac96a91ef301bd9a7bd5402bf6f99762f", 0x4c, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) fcntl$setownex(r0, 0xf, &(0x7f0000000540)={0x2, r3}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000400)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000440)=0x10) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/load\x00', 0x2, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x108, r2, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ceb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x14128a8c}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 403.820919] SELinux: policydb table sizes (1979717128,2097196) do not match mine (8,7) [ 403.833279] EXT4-fs (sda1): Unrecognized mount option "j" or missing value 18:18:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200)={0x9, 0x9, 0x16c0}, 0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) mount(&(0x7f0000000040)=@sr0='/dev/sr0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x88000, &(0x7f00000001c0)='journal_path') 18:18:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 403.918804] SELinux: policydb string length 339173421 does not match expected length 8 [ 403.928778] SELinux: policydb magic number 0x25043cbe does not match expected magic number 0xf97cff8c 18:18:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 403.988794] SELinux: policydb string length 339173421 does not match expected length 8 [ 403.998938] SELinux: policydb magic number 0x25043cbe does not match expected magic number 0xf97cff8c 18:18:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:13 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x402, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x78) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x408000, 0x0) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)) 18:18:13 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 18:18:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:13 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000f2739e640000007941339a66cc8f72f481511da7f180f5518694ac28566a018519c8fbdeca88a1b5b333b7fb"], 0x71) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000100)={0x0, 0x100000001, 0xdc}) getdents64(r1, &(0x7f00000001c0)=""/188, 0xbc) ioctl$void(r0, 0xc0045c79) 18:18:13 executing program 0: r0 = geteuid() syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f00000017c0)=[{&(0x7f00000001c0)="7b1433fc136dcafbf4c2c19fbcdbaf9816449efaa250e754e3cc555a0480087518f28ce7052f9d14daa43fd3dc07c544cbea73d007cc02ef4daedfffb7f24e59a46435b2b637122658f66fd92b17c3ec12e0a7400b433e9bae8f6a20f539ec3c9469e609cc3c547000a24ad21bad43b03c", 0x71, 0x40}, {&(0x7f0000000240)="ed87a1947c0a04f1bca27f01e0b36b3cfa2481b5ebe57f275b62a0a02917ad8c998851e8222153ca2c4334decc4aec363735d24f296732fbc9bf456c390719050c54fb17fdd8096d43c79701c317930db59cba5bb10174bd0080ece0cbf5de815b8190bca267369a5bf05b5303ade3cb235863791479aa54792101acb3cf93a538fc04fca895aec42304c93a3baf6b8e143f4c68631a0c712c6ed03fcb07bf7ce08859d67102f1de3d9ec43d4724878cffc9ccaae25829ffb09bcadc40ffaafb997ae38c1e09107fa9c721e052dbb8496ec2bd934614f1f04800458bca19f0bc3a31bbc7cefc4e3e49aea59ffdb60e0e4f01f628a0d36502", 0xf8, 0x3}, {&(0x7f0000000340)="dee28c100e5b394e5b26844cbf16d670daac78a56ab8a519c10c5661eeedcbefbf225a85324222f47d09f16246d0c3dd503712f835b9dcfa152899a2ee5ad82c42ad7f902df4d8dc67ae71bad7b978e3b5b269ecbfbcb073e1", 0x59, 0x8001}, {&(0x7f00000003c0)="5f17cb3f3be6d44f6a8d6e5cbb929b43b543b4a726bc72e3d2a94e9e7519006f5d7947de08648d649ba95a8b68413d6cb0de1e097a602f6aba63b76d7b611ee45ed8dbd929c863f0648a7e419c1d9ebe3d71464cd989cfaa7ab4f9cc958057089fe0fdaaab877f41872f97852b43ec8216940283a752cd4c9ad93e88241232c02b168905c12924ec5b6e0f86bfdcb15bf70d6b5fe440ed38ecff8cf3e18363685481fe9db8c5f2ea177cf200ab3d98b2bf93d5522724c12c2e504eaf648550d9646bf3c35c094e74c38e", 0xca, 0x9}, {&(0x7f00000004c0)="71491f55029bbe1534a1e17e5347712c4ce4724d45e01ff5d5f65f5a7b7715c82dd4dd3054ae23e46a7ba35d71d03c53fd68c9c1a12f8436e8ce31d9268d004b1402b0be634136f00bb6850947", 0x4d, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x4}, {&(0x7f0000001540)="328f9900e3e782bf5944783486c18d49442060230a20b59988ff01ab105a8163ad8f9ebdf547f83b11a0d7530c03e31d6ff5d922741915319b83571ed89f1deed52e6da05a0ad1d707ede3ce42b16207deb13dbf890d95f884abe638159147b7b74629a6f719eafc94957b19942265e98f99863f31a69e344b8ca191666332b0b5b343e849028cf0f743f07284017d8b532bd2f7ffce91d724b6854e069d067925beaae79fb8d51fdda5bd93c6b9b13601ef43b5c6133d95914438aa37ca81c0999fad6afbc374b486dc22148d025353f79a", 0xd2, 0xfffffffffffffffb}, {&(0x7f0000001640)="1dab9788a0a0b31fdeeb34942ec78c337bdcf063dd44a0d124c3d1ff07a3b72a2dd31eb71c1ee89620c3e0e8964b85160170929763976b2b452f48506892b5a2860e96c9bf54aa87e46f04acd21db153aefbe98d8f16f643a6210e6e129a008fa521c7526f96f040270026de7e2f6b0fac9e7a2c8fbaa03071b15d551d08dcb6e4cc379d4f5bc9e1a1269e600c205083df443f6057d04536f53101d0164521a7811b8bf3861f065cdf929c77755aca7c0890c71c45176149eb91fdaceb627b066d65ba496d1d1b600fb205cdf51a2181acfb7875fa80dbdc7d6a86093feb", 0xde, 0x60}, {&(0x7f0000001740)="3183b6909c3cbed40d679e7515f07920b70424443e993b1ee5401e20e84bd045caa86113387b34b195523d6eaa7b06159bb1024bd7fd3c6fee7ee2c82906b90b5f5a09d90eaced", 0x47}], 0x800000, &(0x7f00000018c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7030}}, {@errors_continue='errors=continue'}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4200000}}, {@norecovery='norecovery'}, {@oldalloc='oldalloc'}, {@nouid32='nouid32'}, {@data_journal='data=journal'}, {@bh='bh'}], [{@obj_user={'obj_user', 0x3d, 'journal_path'}}, {@subj_role={'subj_role', 0x3d, 'journal_path'}}, {@appraise='appraise'}, {@fowner_gt={'fowner>', r0}}, {@obj_user={'obj_user', 0x3d, '\xbbppp0selfproc%^self'}}, {@fsmagic={'fsmagic', 0x3d, 0xe79}}, {@smackfsroot={'smackfsroot', 0x3d, ',%'}}, {@smackfsdef={'smackfsdef', 0x3d, '(lo'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 18:18:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:13 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 18:18:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 18:18:13 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) 18:18:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 3: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:20 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x4000)=nil) 03:33:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='journal_Lath6./file0,\x00']) 03:33:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:20 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20002, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3f, &(0x7f0000000080)=0x1, 0x4) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 03:33:20 executing program 3: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f6000008000000076b0d00402c00000000000009000007c60000000d00000000000000077bfe68020000000000000000d3739e64000000cb67b4cc915e21a4a345202e372a46d09f36ef42b5ed5e9fa145427b6671386bc012ecbd2c1248f0a586160014ba1bceadd5b172b82c00cc9aced482e08dda34f3c15bea30dc1b6499f657b2a0442d42d8412d1047347b309366ea6697d61096c6a50f9930ecb1"], 0x4c) 03:33:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/load\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010000000000000002000700", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r2, @ANYBLOB="040001000000009c962dbe00", @ANYRES32=r3, @ANYBLOB="10000600000000002000060000000000"], 0x3c, 0x2) r4 = open(&(0x7f00000004c0)='./file0\x00', 0x40, 0x16) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000500)) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r4, 0x50, &(0x7f0000000540)}, 0x10) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) 03:33:20 executing program 3: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$revoke(0x3, r1) recvfrom$unix(r0, &(0x7f0000000400)=""/158, 0x9e, 0x40, &(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f7372683d3f43007424a1c5bf82"]) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffff9c, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/117, 0x75, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r0, 0xffffffffffffffbd, &(0x7f0000000340)={&(0x7f00000005c0)=""/198, 0x431, r2}}, 0x10) [ 405.259738] SELinux: policydb table sizes (8,879367) do not match mine (8,7) 03:33:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:20 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000180)={0x7, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e24, @multicast2}}}, 0x108) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:21 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) [ 405.925246] EXT4-fs: 3 callbacks suppressed [ 405.925257] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000009, 03:33:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 406.227385] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000009, 03:33:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:21 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 406.524809] EXT4-fs (sda1): Cannot specify journal on remount 03:33:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) r1 = eventfd2(0xa0, 0x80800) ioctl$FICLONE(r0, 0x40049409, r1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f75726e61585f706174683d2e2f66696c0502598b"]) 03:33:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) 03:33:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 406.722979] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 406.743801] CPU: 1 PID: 13380 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 406.750835] Call Trace: [ 406.753446] dump_stack+0xb9/0x10e [ 406.757005] warn_alloc.cold+0x91/0x1ab [ 406.760989] ? zone_watermark_ok_safe+0x250/0x250 [ 406.765838] ? lock_acquire+0x10f/0x380 [ 406.769814] ? avc_has_perm+0x9c/0x350 [ 406.773707] ? avc_has_perm+0x1b7/0x350 [ 406.778016] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 406.782679] ? __vmalloc_node_range+0x390/0x690 [ 406.787354] ? sel_write_load+0x199/0xfb0 [ 406.791498] ? vmalloc+0x60/0x80 [ 406.794857] ? sel_write_load+0x199/0xfb0 [ 406.799007] ? sel_write_load+0x199/0xfb0 [ 406.803166] ? sel_read_bool+0x240/0x240 [ 406.807228] ? trace_hardirqs_on+0x10/0x10 [ 406.811479] ? __vfs_write+0xf9/0x5a0 [ 406.815281] ? sel_read_bool+0x240/0x240 [ 406.819344] ? kernel_read+0x110/0x110 [ 406.823249] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 406.828701] ? rcu_read_lock_sched_held+0x10a/0x130 [ 406.833725] ? vfs_write+0x17f/0x4d0 [ 406.837450] ? SyS_write+0xc0/0x1a0 [ 406.841078] ? SyS_read+0x1a0/0x1a0 [ 406.844708] ? do_clock_gettime+0xd0/0xd0 [ 406.848858] ? do_syscall_64+0x43/0x4b0 [ 406.852831] ? SyS_read+0x1a0/0x1a0 [ 406.856459] ? do_syscall_64+0x19b/0x4b0 [ 406.860542] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 406.866890] warn_alloc_show_mem: 1 callbacks suppressed [ 406.866893] Mem-Info: [ 406.875048] active_anon:64169 inactive_anon:37 isolated_anon:0 [ 406.875048] active_file:18342 inactive_file:16071 isolated_file:0 [ 406.875048] unevictable:0 dirty:241 writeback:0 unstable:0 [ 406.875048] slab_reclaimable:9545 slab_unreclaimable:55419 [ 406.875048] mapped:58657 shmem:48 pagetables:1133 bounce:0 [ 406.875048] free:1418281 free_pcp:287 free_cma:0 [ 406.909043] Node 0 active_anon:256700kB inactive_anon:148kB active_file:73368kB inactive_file:64208kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234628kB dirty:972kB writeback:0kB shmem:192kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 406.932523] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 406.959191] lowmem_reserve[]: 0 3437 3437 [ 406.963520] Normal free:2593928kB min:5476kB low:8992kB high:12508kB active_anon:256700kB inactive_anon:148kB active_file:73368kB inactive_file:64208kB unevictable:0kB writepending:968kB present:4718592kB managed:3521428kB mlocked:0kB kernel_stack:4000kB pagetables:4532kB bounce:0kB free_pcp:1032kB local_pcp:404kB free_cma:0kB [ 406.993216] lowmem_reserve[]: 0 0 0 [ 406.996920] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB 03:33:22 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) [ 407.011763] Normal: 1164*4kB (UM) 907*8kB (UM) 312*16kB (UME) 330*32kB (UM) 108*64kB (UM) 4*128kB (UME) 4*256kB (M) 22*512kB (UME) 39*1024kB (UM) 20*2048kB (UME) 602*4096kB (M) = 2593864kB [ 407.028877] 34420 total pagecache pages [ 407.032974] 0 pages in swap cache [ 407.036507] Swap cache stats: add 0, delete 0, find 0/0 [ 407.041977] Free swap = 0kB [ 407.045069] Total swap = 0kB [ 407.048152] 1965979 pages RAM [ 407.051362] 0 pages HighMem/MovableOnly [ 407.055429] 315704 pages reserved 03:33:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 407.134383] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 407.145221] CPU: 1 PID: 13394 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 407.152239] Call Trace: [ 407.154812] dump_stack+0xb9/0x10e [ 407.158341] warn_alloc.cold+0x91/0x1ab [ 407.162298] ? zone_watermark_ok_safe+0x250/0x250 [ 407.167124] ? lock_acquire+0x10f/0x380 [ 407.171080] ? avc_has_perm+0x9c/0x350 [ 407.174954] ? avc_has_perm+0x1b7/0x350 [ 407.178907] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 407.183559] ? __vmalloc_node_range+0x390/0x690 [ 407.188237] ? sel_write_load+0x199/0xfb0 [ 407.192366] ? vmalloc+0x60/0x80 [ 407.195711] ? sel_write_load+0x199/0xfb0 [ 407.199836] ? sel_write_load+0x199/0xfb0 [ 407.203966] ? sel_read_bool+0x240/0x240 [ 407.208008] ? trace_hardirqs_on+0x10/0x10 [ 407.212228] ? __vfs_write+0xf9/0x5a0 [ 407.216006] ? sel_read_bool+0x240/0x240 [ 407.220057] ? kernel_read+0x110/0x110 [ 407.223938] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 407.229370] ? rcu_read_lock_sched_held+0x10a/0x130 03:33:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) [ 407.234367] ? vfs_write+0x17f/0x4d0 [ 407.238061] ? SyS_write+0xc0/0x1a0 [ 407.241688] ? SyS_read+0x1a0/0x1a0 [ 407.245292] ? do_clock_gettime+0xd0/0xd0 [ 407.249426] ? do_syscall_64+0x43/0x4b0 [ 407.253383] ? SyS_read+0x1a0/0x1a0 [ 407.256991] ? do_syscall_64+0x19b/0x4b0 [ 407.261037] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='journal_path=./fioe0,\x00']) 03:33:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 407.371261] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 407.397241] CPU: 0 PID: 13408 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 407.404281] Call Trace: [ 407.406879] dump_stack+0xb9/0x10e [ 407.410448] warn_alloc.cold+0x91/0x1ab [ 407.414454] ? zone_watermark_ok_safe+0x250/0x250 [ 407.419303] ? lock_acquire+0x10f/0x380 [ 407.423281] ? avc_has_perm+0x9c/0x350 [ 407.427191] ? avc_has_perm+0x1b7/0x350 [ 407.431176] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 407.435863] ? __vmalloc_node_range+0x390/0x690 [ 407.440541] ? sel_write_load+0x199/0xfb0 [ 407.444697] ? vmalloc+0x60/0x80 [ 407.448069] ? sel_write_load+0x199/0xfb0 [ 407.452219] ? sel_write_load+0x199/0xfb0 [ 407.456377] ? sel_read_bool+0x240/0x240 [ 407.460460] ? trace_hardirqs_on+0x10/0x10 [ 407.464711] ? __vfs_write+0xf9/0x5a0 03:33:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[], 0x0) [ 407.468512] ? sel_read_bool+0x240/0x240 [ 407.472576] ? kernel_read+0x110/0x110 [ 407.476492] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 407.481959] ? rcu_read_lock_sched_held+0x10a/0x130 [ 407.486982] ? vfs_write+0x17f/0x4d0 [ 407.490703] ? SyS_write+0xc0/0x1a0 [ 407.494334] ? SyS_read+0x1a0/0x1a0 [ 407.497969] ? do_clock_gettime+0xd0/0xd0 [ 407.502119] ? do_syscall_64+0x43/0x4b0 [ 407.506095] ? SyS_read+0x1a0/0x1a0 [ 407.509733] ? do_syscall_64+0x19b/0x4b0 [ 407.513819] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) 03:33:22 executing program 0: mkdir(&(0x7f0000000700)='./file0\x00', 0x4000000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000580)='/dev/keychord\x00', 0x400, 0x0) sendto(r0, &(0x7f0000000480)="34f9f444331dc612f361dc682c94edbae5e9f057dca9b07d52c39b207891cd08beee9d80fe540cbfd4e367bd9f33374af56306f6d95e906d7e0483086b9c8b305fd98be71fa38a633aa0863adc5abf1cfc87bc04ffb7ae795fcf8ca1dcc2eeef92522474aae162d38fe11eeee967c789e5285c43a623b018d43725a65d6e0bdfa44ed31347268b14dce581c2ced2eff69083b261368b37938ad2d1b08a7bf3e95afe6dfad148cfc2153ad27534f140064574acfbde0cd7219d023cf57178386f57b70fd92ba3cb9de9e96f0345051892fa", 0xd1, 0x800, &(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @empty}, 0x0, 0x4, 0x4, 0x2}}, 0x80) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$inet(0x2, 0x7, 0x4) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f00000003c0)=""/129) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000002c0)=@add_del={0x2, &(0x7f00000001c0)='vcan0\x00'}) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000340)=@get={0x1, &(0x7f0000000300)=""/31, 0x7}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000640)=@add_del={0x2, &(0x7f0000000000)='bcsh0\x00'}) lgetxattr(&(0x7f0000000100)='\x00', &(0x7f0000000140)=@random={'osx.', '\x00'}, &(0x7f0000000180)=""/59, 0x3b) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2000, 0x16c) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) [ 407.703879] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 407.746071] CPU: 0 PID: 13423 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 407.753126] Call Trace: [ 407.755721] dump_stack+0xb9/0x10e [ 407.759280] warn_alloc.cold+0x91/0x1ab [ 407.763264] ? zone_watermark_ok_safe+0x250/0x250 [ 407.768115] ? lock_acquire+0x10f/0x380 [ 407.772092] ? avc_has_perm+0x9c/0x350 [ 407.775995] ? avc_has_perm+0x1b7/0x350 [ 407.779978] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 407.784662] ? __vmalloc_node_range+0x390/0x690 [ 407.789342] ? sel_write_load+0x199/0xfb0 [ 407.793647] ? vmalloc+0x60/0x80 [ 407.797004] ? sel_write_load+0x199/0xfb0 [ 407.801137] ? sel_write_load+0x199/0xfb0 [ 407.805274] ? sel_read_bool+0x240/0x240 [ 407.809319] ? trace_hardirqs_on+0x10/0x10 [ 407.813543] ? __vfs_write+0xf9/0x5a0 [ 407.817325] ? sel_read_bool+0x240/0x240 [ 407.821367] ? kernel_read+0x110/0x110 [ 407.825262] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 407.830709] ? rcu_read_lock_sched_held+0x10a/0x130 [ 407.835709] ? vfs_write+0x17f/0x4d0 [ 407.839405] ? SyS_write+0xc0/0x1a0 [ 407.843020] ? SyS_read+0x1a0/0x1a0 [ 407.846645] ? do_clock_gettime+0xd0/0xd0 [ 407.850791] ? do_syscall_64+0x43/0x4b0 [ 407.854745] ? SyS_read+0x1a0/0x1a0 [ 407.858353] ? do_syscall_64+0x19b/0x4b0 [ 407.862403] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:23 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[], 0x0) 03:33:23 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) 03:33:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 408.051184] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 408.081238] raw_sendmsg: syz-executor0 forgot to set AF_INET. Fix it! [ 408.101075] CPU: 1 PID: 13443 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 408.108119] Call Trace: [ 408.110722] dump_stack+0xb9/0x10e [ 408.114295] warn_alloc.cold+0x91/0x1ab [ 408.118276] ? zone_watermark_ok_safe+0x250/0x250 [ 408.123149] ? lock_acquire+0x10f/0x380 [ 408.127130] ? avc_has_perm+0x9c/0x350 [ 408.131046] ? avc_has_perm+0x1b7/0x350 [ 408.135030] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 408.139713] ? __vmalloc_node_range+0x390/0x690 [ 408.144390] ? sel_write_load+0x199/0xfb0 [ 408.148556] ? vmalloc+0x60/0x80 [ 408.151924] ? sel_write_load+0x199/0xfb0 [ 408.156091] ? sel_write_load+0x199/0xfb0 [ 408.160246] ? sel_read_bool+0x240/0x240 [ 408.164328] ? trace_hardirqs_on+0x10/0x10 [ 408.168582] ? __vfs_write+0xf9/0x5a0 [ 408.172385] ? sel_read_bool+0x240/0x240 [ 408.176465] ? kernel_read+0x110/0x110 [ 408.180375] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 408.185849] ? rcu_read_lock_sched_held+0x10a/0x130 [ 408.190880] ? vfs_write+0x17f/0x4d0 [ 408.194600] ? SyS_write+0xc0/0x1a0 [ 408.198229] ? SyS_read+0x1a0/0x1a0 [ 408.201859] ? do_clock_gettime+0xd0/0xd0 [ 408.206010] ? do_syscall_64+0x43/0x4b0 [ 408.209984] ? SyS_read+0x1a0/0x1a0 [ 408.213616] ? do_syscall_64+0x19b/0x4b0 [ 408.217695] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 408.224734] warn_alloc_show_mem: 3 callbacks suppressed [ 408.224737] Mem-Info: [ 408.232701] active_anon:64407 inactive_anon:36 isolated_anon:0 [ 408.232701] active_file:18342 inactive_file:18259 isolated_file:0 [ 408.232701] unevictable:0 dirty:2447 writeback:0 unstable:0 [ 408.232701] slab_reclaimable:9822 slab_unreclaimable:55090 [ 408.232701] mapped:58687 shmem:47 pagetables:1135 bounce:0 [ 408.232701] free:1415952 free_pcp:120 free_cma:0 [ 408.266837] Node 0 active_anon:257628kB inactive_anon:144kB active_file:73368kB inactive_file:75536kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234648kB dirty:12388kB writeback:0kB shmem:188kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 408.292235] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 408.319147] lowmem_reserve[]: 0 3437 3437 [ 408.323526] Normal free:2578500kB min:5476kB low:8992kB high:12508kB active_anon:257428kB inactive_anon:144kB active_file:73368kB inactive_file:79236kB unevictable:0kB writepending:16084kB present:4718592kB managed:3521428kB mlocked:0kB kernel_stack:4032kB pagetables:4540kB bounce:0kB free_pcp:872kB local_pcp:496kB free_cma:0kB [ 408.353642] lowmem_reserve[]: 0 0 0 [ 408.357411] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB [ 408.372340] Normal: 742*4kB (U) 658*8kB (UE) 131*16kB (UM) 181*32kB (UME) 61*64kB (UM) 3*128kB (UM) 1*256kB (M) 21*512kB (UM) 40*1024kB (UME) 19*2048kB (UM) 602*4096kB (M) = 2577080kB [ 408.389085] 38553 total pagecache pages [ 408.393229] 0 pages in swap cache [ 408.396816] Swap cache stats: add 0, delete 0, find 0/0 03:33:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[], 0x0) 03:33:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 408.402316] Free swap = 0kB [ 408.405411] Total swap = 0kB [ 408.408539] 1965979 pages RAM [ 408.411781] 0 pages HighMem/MovableOnly [ 408.415850] 315704 pages reserved 03:33:23 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) socket$inet_udp(0x2, 0x2, 0x0) 03:33:23 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:23 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) [ 408.697332] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 408.745617] CPU: 1 PID: 13490 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 408.752665] Call Trace: [ 408.755272] dump_stack+0xb9/0x10e [ 408.758829] warn_alloc.cold+0x91/0x1ab [ 408.762838] ? zone_watermark_ok_safe+0x250/0x250 [ 408.767686] ? lock_acquire+0x10f/0x380 [ 408.771667] ? avc_has_perm+0x9c/0x350 [ 408.775574] ? avc_has_perm+0x1b7/0x350 [ 408.779567] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 408.784270] ? __vmalloc_node_range+0x390/0x690 [ 408.788955] ? sel_write_load+0x199/0xfb0 [ 408.793584] ? vmalloc+0x60/0x80 [ 408.796960] ? sel_write_load+0x199/0xfb0 [ 408.801108] ? sel_write_load+0x199/0xfb0 [ 408.805266] ? sel_read_bool+0x240/0x240 [ 408.809340] ? trace_hardirqs_on+0x10/0x10 [ 408.813590] ? __vfs_write+0xf9/0x5a0 [ 408.817392] ? sel_read_bool+0x240/0x240 [ 408.821482] ? kernel_read+0x110/0x110 [ 408.825394] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 408.830859] ? rcu_read_lock_sched_held+0x10a/0x130 [ 408.835888] ? vfs_write+0x17f/0x4d0 [ 408.839608] ? SyS_write+0xc0/0x1a0 03:33:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) [ 408.843243] ? SyS_read+0x1a0/0x1a0 [ 408.846873] ? do_clock_gettime+0xd0/0xd0 [ 408.851022] ? do_syscall_64+0x43/0x4b0 [ 408.855011] ? SyS_read+0x1a0/0x1a0 [ 408.858642] ? do_syscall_64+0x19b/0x4b0 [ 408.862716] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:24 executing program 0: mkdir(&(0x7f0000001440)='./file0\x00', 0x15f) r0 = getpgrp(0x0) r1 = gettid() mmap(&(0x7f0000000000/0xfd0000)=nil, 0xfd0000, 0xfffffefffffffffd, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x936000)=nil, 0x936000, 0x3, 0x32, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f000058a000)={0x0, 0x0, 0x4}) rt_sigtimedwait(&(0x7f0000001ff8)={0x3ffff}, &(0x7f0000f0aff0), &(0x7f0000fbcff0)={0xffffd, 0x989680}, 0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file1\x00', 0x7, 0x3, &(0x7f0000001380)=[{&(0x7f0000000180)="1aff04741075e27b624a960ab57d6ed4039ef7ec936922a6363e87b6ecda6554ed914e351a6585b5c1ae4bf5b637a2bb07bd017d32fd9d07e5fa7b8c919d94082b74f03db6b827668708c4ded6deb35f26c76f4ad3ee331a8996d7cbe970f6a2d3e400129f7371214427ef2ed3c9f095c5567c22fdd18814dacdfd5dd4cf2fad4cb5cce53cf00248f471b8633897263f1a2e1a25f75b7cf25ccecdabb9bc4dd979300dc2e647d22578a9e122c766ad562ef133e5fff09c778f0c752e01a56f0fd1902002be93222b262812af88f1e3fe927a8deefbee1675011919ca1db5663be52482e7220d7911cd13f77a7588bab2989849577922814a1fbe9228ef86cfb9f158f40cbe22d082aa82e8cc4cbb89f40c01773846364a998898a8c1f02673bd2712e8040408a266c4f98a0685fef4d5d2862c8183f8439551728359fcd02dce5dcda8917e2888dcec1799142d6ac9a47a4e60f07550b89e6db09f5363431ac871e9fd95c6567459cc075e0bd4cf52a84bba2b524f2ea80b90545c6402bce1b706c0d51888787fef06938dea666106ba438bfe8a3a59a749f7987521e2a67ce769f0550e7a050cf12c257b4730e356c282d4c1a80765c05c2bbe0da8cd581371d99eadd478b60a980beb8a644214a9a0c81ed60c69cae02fc7d4d87265235ac5ba3d0901acd7640af078d70e0ceecf3f8d329c536c4fd60958768f630fb6e1a5fbb784e615b33bad3baf768de1b947444854e591d20b45bc83fa8fb37310dca6733cd78cec16b12c106ab16ca975cba1566e853807f5dc6c1860c15a8dbfac9b75b0f8529cef7bab0728c4dea1e045e216fb1b50267ed5c2953218c54eac06e4a47fc3706658cb1be903ba55d0d2181d6768d691ffe9fcab9853be4be53924403a99f046b8d5e369badb49129ba577e974083d0815267f65ea821f1e87fa69322e33c8b44362c02e51bc774b009506a3afd93b29fdad20958803f165b827852aa682e7601b788705841bece071bdedd8c755c0aaa601cbe46608485f3371c1f655940312fc6c12d5a17f3810098b6275f3d563015d29c9c1d8be2491ca59c749709bf4839b3f744fb33a9957c9bc0d10962f9c84d7b22bcbbab1de773351c918d56956a425f4366be495aa18a4570f6e21002bd37a028bb2452935cf2210b0b1c5d856a7458107a97f0fdb36e247714433bf0771751e3a9a699a50b365719a363b0b07da73f6017f457dfe6481d7a013e61bb709a7b0f254b391c5aa7c44904030506dda99a150c1a4235a4349da0ef6c6671b743efc6a35dc3d3546e3c973d5b71d99bc309e026c7c83964d88519fe4808f243e05fc012edef10fdb8f1a5e778cad6f027f7107ec9de70fc5350acfd1e4d2d5378fc4841759e07fee9d5374f4989d6e492325f0d178f3f2afc13a2c0581531f3e6ca4b50a6e16a11ab78673cc6549e3de07691af5e653065475211c4a1e3143fce85c9ca00dc0e266afdc2ee6af4403153ae14b36b64515208bddf19137ab75c06e0624fd40bd070f3bff1cc9ac2a02d7aadf0c7c2b1d3841bdf14f3ee3622cc2f61b8b5f200f73eaedc4ed6cfcb8a51d24b1cc764adf27316dacb6e38b219ddae5b8b3847ad43172755d7d134fbea7a42058dc02be65fe6f2047e5e6aeb58875d0750d6822657de703f67584a6beb9b864baa7725da11cd72628ab8ad0d26dbf3a0560989e9449e4fa8f36436443ff8a97d018eb329946dfada837c6e0623e6feb7c1d9f405b32f4fe594a0a6bd5188e0c722e3ef3a2f31b93143ce9fcd6a5846fa28adb53981179aa2b6c5b384a0863a02cd207c6e562a1b0bd2922a6a172e08c27fea3f9d8b9be7bfb4bc2cc05915f756f6120bbf9a154239db5f63c6fefa91605c6b13fffa449924dd346263abd722d81dbc57d78ce119a9e74109f102b5f0073a0e43a4faf039b853abfd9d8e6c7026b6a3e99b9673ca7fad5839c993c7dcf507c862828575b8237c58b4ce2c5c2ce1b24981924edd5c984cc9f147a9122a6ab0b212cf335207fd1f9aabf045dcef7d71f8d78fd9c5f2e753ba943ae2f2ed69e54100cad558148c05fe795d8ade0b63b85a5169df9cabb9aa21c5e1c4da73b8924cc7cf744c2243de867174e3dd8113b3ec2c29b9f7cce0d4f11718749578b76a80b7c28e8d7e407eaf3069692d622720f075eeae69acb490fedea5d890d5fa25bb1f9d5c0f1bc0f35b6cf16a4f25293149b8a089deec94bcd3095a23c2124f987ba013be83ea798924e93aab812cf07d73ea431af6584be52559a45782a16e38b4adb1e9386980d6bda5982ee32c81b68873841a42425b7cf59f01cd4ce239e0b78ff7c201719d5e184c8a0ae765f1b8633cb3e48e23873c8fc36c1a234c8f3196556213429d5e54e78c916523b01b328373f6435f211cf0fdd0debc753e98237409debe889241be23761e9cb54dfa2159ff034dfc32effa3eb0832b292996abf007a470f6e2739aef1db06c06d00178be3317b66640a0924971d9fc40d4e1fa460284082a2724492f6cf2b3fae1132e905ac99ff0fff9092bac67356cddc820aae9ba7cfe029018d7430eae720de788d8d4b3fb56e9af4d616190d858f6e6f3355f7bdfc9c4713563806ad31499452387b5df5567c53e4818e25392e27b55ae22bd7b6ab5990f1198b9fa2a81857e9eb512f3ec04344c230127ccc637a59c7bf625ff1ff2020707a9c5e827b493e85bfc772a0d044b5cecb1df3b749c57c25ccc5336f87da300cbaee36f433d0b5a3b996dd2433cec749f6ed88f57553afa2986386ee68d0784c8fe8b5f3b3c9bf54c1d0fa05288f84f99f7ed19e679ba45c283ec7478f62faf38af0cdcef581aebe02d924671dd8f3f3d8c26c6c2967190b39b8d7669be53503b4e49c7a6dbbe56dad1d5dc4a0b017adeed6a4ff5a164d6643f5b3011b48cf5f78279373540c086127214b95728b7bcb1eeb907d9122a903440a848f02d9ac835ced6456e696cbac31f6f09639cba99724c7bf5005bcbf3c5eb4a345cc3b843dd88724b80f5199c4614116bd5176a2a0de04e828af08bbb29ae427f02f7d537978ff2920beb50e6e63496afce0c86ceda10f3f9ba3a043c640c1025bdf78dc471c5fc8abc919cc536470f7e2d50c9983615434ae1e4ab341ed95b570aacbdc33244f7077273e6e1829d0a42b128d8847a57f0489c2d668cacdc04d1a1c4165667d681e7f14c6b62b8ff47c102ac7d6c3f0c1b17002bd74c72358fb5890f2be416ca2d9bea82a1a4142781c0c59adb544e0c1cf63ce573d1cad4a08464ec4ccf9e550bf70543ab86205332992c44947734a805a4506ee76c761a2685a0399c429bdf9f250eb913a35e67685eaf40ce3d01a798c286434b5700d59367239ab103c8df4f3fffe16efa9410b4da355cccc16f89ffb7b85ecd3a472fde9e59d7a782f140feed0498e81483fe624dd5eca712990920daeb02d2541c35a06679828dcc325a8bd70e437f37b419db659d7325c5ed54298f7d37e74af7f3b27a33b66fdb30f01f6ddc776339e931dd376b4ee8e0d46a01cd3f281052d7a88c2a44c32fe02e4040280d3015c27913f601d5ed1103183701f684591ec83f1c26404eb5bd390b226b6e540b8612d5e017d2e27583cb42ff5974f1157ccb2a5c96785ddd2fa442d96b4822d8dacfeeda74f31d5d3bd6c78b6ee260cf896e1a1cd7bb8f4bf3dd263184f4fc6b4ac79a186098633f78d9dec2a661bb7049d74edbddd21d02a1097b5b6f4fae449a1638d6b1ed6235159fe1232f44d154b7d329ef40c69eb242c443e8c1350878d4efbc5bd925b701846961ba58d80f3f291c552c47526b70a4dcd17f4e9f3457cda5638b3f1403242bf018be5f8c32da4745130e5e383955c7035e6fafaa8486d43d5f195f97819de07dbb7f82aa6e58228cd83bb0d02f30868060d6fc1db8900ef6977e485a26db91f9f12239fa62016c79ce8949a40953b182d904c1ce98112e550f3e9a4391084de35e5e6d5d52ff4f94ec2147228fa048c60049f6cbf8d806ff6834af57912651aa0c4321f7659955879bf3ac26c723b393bd4963603edc32426d61ddda680cb822d941588510d3b7bcfd29cdf9a78f238f93fc5e80f46d246e0ed0aca37ce856ff159841ac25222664fad96b16c9af04a3e4ed1a34887cdae8266c887d1b2339877c599d1193efe55b09d2e1896f5354204900ef578122e27783cd8af6a339adb6847a31d4d28fbece7b06e252aeb437f4df57ee4f7da1c4db55c7e883850617269d4e2757f951c11b5d3da7a96f3920e1ceaa6c8733466cb68b4a7986bcd6431f8981a1e7109ae42b3c37e4b1eca4a7c4547cf9483de1392083a9fed7273f299ee6f2944f068f6c1648c1b8ce0a00d38ed36dbc39d4b62938d6c958a27178811d20120735e4193aee97f45ee42ac1067fea4c6b3f277b5bdeab92057203d826cbdacf4fe7b94d94616e83a21c901545b34544afbc90a6e68dad14fcb07f2b5a768efd714fa671385ebaa548fa80ac9c99c870d074850fe2153f7fdc7863f585cc2f43df8af411daf4f4fe2807c91ef05fc8f14e998cdeb77f636a6b44c8d82d22e2ef72aad7cb0a214351af97f944331901e3b9e0197c95e7a52ce44497b44419180eacbf942574eebaa69e7735d7ca6b1f5e832fd0ce317d7736636ebae39292ac17826bc65c62c1d2c29cd4f761b3248ed820e64eee3057a66b5be7e618a4b072a4092c1275265c3ed1d2282cee42880e969d28c5dabcbb2fa8593a6bea7e9efe56082a91f7430164879987d2f7f8f1e42c2fcfc5f31fc25ce05e85cfbccaf7922436dd4093f52a67e5360ed5c56b0fc09c9dd808d79293aff8d74314ee089401a291f2bbd04bd2bee4378c50c7f15ab075c97a27ad70908359fcea10d24698dcea78461dda878e08eb9693ac2789431592a40e5736544856c2d880147131d99121866f6d449bb499316412d3ec67c12f417067080c3908f1e0052c80503358b1539fef024fd190c10033bdf39c6839063233253c7f0d9b5b3323b9aa7f6f36c4ac70171fb6293b4058bfc2b20f13eb938b7f039ea8d3e69f5db9401e951837aec0acf3760dacbb5e98cdfaac1e0d741850e376cde7508c142765572e4414dfd625fe867a86e619f8d741c8638cdc3d495aed4b70feadce4bde0e566e260782839603405aaa2e4c0a41a23b3a67712f749b7c74ce89c488c456cc5d3e0f6441f264db945764fdeb6558b6e143e86cec01cddc66b8d509129c1786a8f4e1e5116cc7abbd83529c1894e24e17bb175230d54819afc179b933100e5daa7bd2e36402558a6d5beb97c2dbf8ef68a55a34771e40de170643d248c995e1d34e2e52e6cea09116e8305ae3ae4ada85c91cfa0bd981d814fef4551100ad88a7a38958977cd5bd373717640299734aecc89adf282803360cf5c7358c95bbad88aaef3206cb162646de98da17483ef5b28441be2a1b68b0c6700bf541e842ed55bef0371572b510879c42c60b32b2aeab3ef8bf243e5945cf54abf45d405c360cbc061f7844cbc6b3a7e3c08080e8b2f5b8115a965aa48c522e9af1d4a756398843df27e3c37dc78ef9e4d6036a967ef94b808762e88f8da16f14202d83ce8312dbc2775b4219f86e6dfbe67d9a359f6990fdd3d93d9c8761a09324f8f8e3780dd4761ef4551c255a43c6941128561d337fe6d2b3f0903d8344fe8f37bbb34bf446bdfe3629a03389f74216812cf11232ab3f89136c881ac8c458d0ee4dab24fb680fa5d6f641d7e5ff86825dfca74124cf3ccc7e2a10e", 0x1000, 0x4f0}, {&(0x7f0000001180)="dfa647059be629341917bdebe09de816502b061583b7d3e530791dc074d6b7602c7aa6f7dbb57c30651acb6522c00e0e217294d47b5da4cf6a9ee214e566c491a9e2f73c0be7065857dd744b6001ef80bcfe1a2f3c3df655c7bca6fee4a28c19ad049096707a7f25fcb46506d6550e5a641534044b6f495664a70fa2acffdad4d50606d88d7160828552e1904d586f69fa7ffc0b62f55696d1bba324ba88bfd9fa870577f40dce21bcedf3f3a9b1ea27545a5838fc180e3d4084f6867e4b35b42d438c518dc3484f842d9f49062948fecb399f0040616ec6f0064b298b3aa07248050f5db18359e2b506165d08bc2d002ba308b1f1ff", 0xf6, 0x8}, {&(0x7f0000001280)="a51ccf7b290dec3a47e3000055e2bc3b4daa8b9927182b137d578e713da3574afed1cbfc7f97f01f952656eadfb4016e1d324930cd383f155c046c76b72bd53dad3a46a4abea61304ed11646abc7794994334e3e9c6578706bb662ccafa7d005388c9d74dc6bcc92a1aadfe3693029ed3fcbd1358fa646217de180e451d2ea34acb0fe5ed66c605553e90d83c55b3acd96b3c960c749eb6de966aa42ca26e654ad2330cbf10448c8cd2fd4d3d9c4b2afeae440eea4ecb0bfb92fb7d0da3868574236281ad3", 0xc5, 0x8001}], 0x800, &(0x7f0000001400)={[{@acl='acl'}, {@journal_checksum='journal_checksum'}, {@journal_dev={'journal_dev', 0x3d, 0x1ff}}]}) 03:33:24 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) [ 408.968717] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 409.026238] CPU: 0 PID: 13507 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 409.033288] Call Trace: [ 409.035883] dump_stack+0xb9/0x10e [ 409.039459] warn_alloc.cold+0x91/0x1ab [ 409.043458] ? zone_watermark_ok_safe+0x250/0x250 [ 409.048309] ? lock_acquire+0x10f/0x380 [ 409.052291] ? avc_has_perm+0x9c/0x350 [ 409.056170] ? avc_has_perm+0x1b7/0x350 [ 409.060135] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 409.064801] ? __vmalloc_node_range+0x390/0x690 [ 409.069458] ? sel_write_load+0x199/0xfb0 [ 409.073593] ? vmalloc+0x60/0x80 [ 409.076940] ? sel_write_load+0x199/0xfb0 [ 409.081078] ? sel_write_load+0x199/0xfb0 [ 409.085220] ? sel_read_bool+0x240/0x240 [ 409.089274] ? trace_hardirqs_on+0x10/0x10 [ 409.093519] ? __vfs_write+0xf9/0x5a0 [ 409.097309] ? sel_read_bool+0x240/0x240 [ 409.101359] ? kernel_read+0x110/0x110 [ 409.105264] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 409.110707] ? rcu_read_lock_sched_held+0x10a/0x130 [ 409.115727] ? vfs_write+0x17f/0x4d0 [ 409.119449] ? SyS_write+0xc0/0x1a0 [ 409.123059] ? SyS_read+0x1a0/0x1a0 03:33:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) [ 409.126667] ? do_clock_gettime+0xd0/0xd0 [ 409.130803] ? do_syscall_64+0x43/0x4b0 [ 409.134761] ? SyS_read+0x1a0/0x1a0 [ 409.138373] ? do_syscall_64+0x19b/0x4b0 [ 409.142430] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:24 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$revoke(0x3, r1) recvfrom$unix(r0, &(0x7f0000000400)=""/158, 0x9e, 0x40, &(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f7372683d3f43007424a1c5bf82"]) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffff9c, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/117, 0x75, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r0, 0xffffffffffffffbd, &(0x7f0000000340)={&(0x7f00000005c0)=""/198, 0x431, r2}}, 0x10) [ 409.453435] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 409.473782] CPU: 1 PID: 13537 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 409.480807] Call Trace: [ 409.483402] dump_stack+0xb9/0x10e [ 409.486976] warn_alloc.cold+0x91/0x1ab [ 409.490997] ? zone_watermark_ok_safe+0x250/0x250 [ 409.495842] ? lock_acquire+0x10f/0x380 [ 409.499822] ? avc_has_perm+0x9c/0x350 [ 409.503726] ? avc_has_perm+0x1b7/0x350 [ 409.507715] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 409.512401] ? __vmalloc_node_range+0x390/0x690 [ 409.517102] ? sel_write_load+0x199/0xfb0 [ 409.521257] ? vmalloc+0x60/0x80 [ 409.524626] ? sel_write_load+0x199/0xfb0 [ 409.528773] ? sel_write_load+0x199/0xfb0 [ 409.532932] ? sel_read_bool+0x240/0x240 [ 409.537006] ? trace_hardirqs_on+0x10/0x10 [ 409.541257] ? __vfs_write+0xf9/0x5a0 [ 409.545057] ? sel_read_bool+0x240/0x240 [ 409.549122] ? kernel_read+0x110/0x110 [ 409.553033] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 409.558506] ? rcu_read_lock_sched_held+0x10a/0x130 [ 409.563534] ? vfs_write+0x17f/0x4d0 [ 409.567254] ? SyS_write+0xc0/0x1a0 [ 409.570901] ? SyS_read+0x1a0/0x1a0 [ 409.574529] ? do_clock_gettime+0xd0/0xd0 [ 409.578677] ? do_syscall_64+0x43/0x4b0 [ 409.582650] ? SyS_read+0x1a0/0x1a0 [ 409.586294] ? do_syscall_64+0x19b/0x4b0 [ 409.590370] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 409.630176] warn_alloc_show_mem: 2 callbacks suppressed [ 409.630180] Mem-Info: [ 409.638561] active_anon:64778 inactive_anon:38 isolated_anon:0 [ 409.638561] active_file:18342 inactive_file:19544 isolated_file:0 [ 409.638561] unevictable:0 dirty:3748 writeback:0 unstable:0 [ 409.638561] slab_reclaimable:9931 slab_unreclaimable:55043 [ 409.638561] mapped:58644 shmem:47 pagetables:1191 bounce:0 [ 409.638561] free:1414247 free_pcp:118 free_cma:0 [ 409.672496] Node 0 active_anon:259212kB inactive_anon:152kB active_file:73368kB inactive_file:80576kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234576kB dirty:17492kB writeback:0kB shmem:188kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 409.700273] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 409.727356] lowmem_reserve[]: 0 3437 3437 [ 409.731754] Normal free:2574744kB min:5476kB low:8992kB high:12508kB active_anon:259268kB inactive_anon:148kB active_file:73368kB inactive_file:80660kB unevictable:0kB writepending:17500kB present:4718592kB managed:3521428kB mlocked:0kB kernel_stack:4128kB pagetables:4824kB bounce:0kB free_pcp:764kB local_pcp:404kB free_cma:0kB [ 409.761019] lowmem_reserve[]: 0 0 0 [ 409.764709] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB 03:33:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) 03:33:24 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) [ 409.779519] Normal: 710*4kB (UM) 660*8kB (UM) 132*16kB (U) 167*32kB (UE) 64*64kB (UE) 5*128kB (UME) 2*256kB (ME) 18*512kB (UME) 39*1024kB (UM) 19*2048kB (UM) 602*4096kB (M) = 2574680kB [ 409.796334] 38558 total pagecache pages [ 409.800508] 0 pages in swap cache [ 409.804011] Swap cache stats: add 0, delete 0, find 0/0 [ 409.809403] Free swap = 0kB [ 409.812590] Total swap = 0kB [ 409.815659] 1965979 pages RAM [ 409.818795] 0 pages HighMem/MovableOnly [ 409.822873] 315704 pages reserved 03:33:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:25 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) [ 409.926243] EXT4-fs (sda1): Unrecognized mount option "josrh=?C" or missing value [ 409.932804] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 409.974782] CPU: 0 PID: 13556 Comm: syz-executor4 Not tainted 4.14.96+ #19 [ 409.981841] Call Trace: [ 409.984457] dump_stack+0xb9/0x10e [ 409.988018] warn_alloc.cold+0x91/0x1ab [ 409.992006] ? zone_watermark_ok_safe+0x250/0x250 [ 409.996855] ? lock_acquire+0x10f/0x380 [ 410.000831] ? avc_has_perm+0x9c/0x350 [ 410.004730] ? avc_has_perm+0x1b7/0x350 [ 410.008710] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 410.013392] ? __vmalloc_node_range+0x390/0x690 [ 410.018084] ? sel_write_load+0x199/0xfb0 [ 410.022240] ? vmalloc+0x60/0x80 [ 410.025614] ? sel_write_load+0x199/0xfb0 [ 410.029766] ? sel_write_load+0x199/0xfb0 [ 410.033922] ? sel_read_bool+0x240/0x240 [ 410.037991] ? trace_hardirqs_on+0x10/0x10 [ 410.042239] ? __vfs_write+0xf9/0x5a0 [ 410.046043] ? sel_read_bool+0x240/0x240 [ 410.050109] ? kernel_read+0x110/0x110 [ 410.054023] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 410.059479] ? rcu_read_lock_sched_held+0x10a/0x130 [ 410.064502] ? vfs_write+0x17f/0x4d0 [ 410.068221] ? SyS_write+0xc0/0x1a0 [ 410.071852] ? SyS_read+0x1a0/0x1a0 03:33:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000"], 0x26) 03:33:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='.\x00', 0x9, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="cb216be4f9c38fb4bdd3b2448d3c9d5d93bbfcd49c96f54a4ffa2e136b8d8c707295aacb43581e997f8b13f585a1005f99a0cf7a899b886dee4eddc87af1ef836586db59002aa500a59ff74bdb8781fb9dae479ab0b6f5aa43bad271f2abe7befa2353ab65da40a191275cac570455d273", 0x71, 0x10001}, {&(0x7f0000000200)="e02fe6214085be23f79179d8a8543c0391457e3a5d2a3fde2c6b36e00fbe659c9b3d4fd7e2005ecc6c549a4367a0", 0x2e, 0x200}], 0x0, &(0x7f00000003c0)={[{@nojournal_checksum='nojournal_checksum'}, {@data_ordered='data=ordered'}, {@sb={'sb', 0x3d, 0x3f}}, {@journal_dev={'journal_dev', 0x3d, 0x2}}], [{@measure='measure'}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfshat={'smackfshat', 0x3d, 'journal_path'}}, {@subj_role={'subj_role', 0x3d, 'ppp1mime_type'}}, {@audit='audit'}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, 'journal_path'}}, {@fowner_gt={'fowner>', r0}}]}) [ 410.075486] ? do_clock_gettime+0xd0/0xd0 [ 410.079642] ? do_syscall_64+0x43/0x4b0 [ 410.083620] ? SyS_read+0x1a0/0x1a0 [ 410.087251] ? do_syscall_64+0x19b/0x4b0 [ 410.091323] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:25 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:25 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000"], 0x26) [ 410.313835] sel_write_load: 63 callbacks suppressed [ 410.313840] SELinux: failed to load policy [ 410.351497] EXT4-fs (sda1): Cannot specify journal on remount 03:33:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000"], 0x26) [ 410.374718] SELinux: failed to load policy 03:33:25 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d0000000000000007"], 0x39) [ 410.446716] SELinux: failed to load policy [ 410.463100] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:33:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 410.541104] SELinux: failed to load policy [ 410.586300] EXT4-fs (sda1): Cannot specify journal on remount 03:33:25 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x20) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB="896a6f75d1fb04726e616c5f706174683d2e2f62696c65302c00cbadd771fb56cb4be2beff564c3e2d9c772ab6876ec25c9b661e75582058c8d453729500adff936b440b243a0db0b57db627120c1de0e5863eb94b5c606a1085aabc71bb0e0298c232eecfc4831b9cde000924fec686f4a2e5895f7d5b53db368f10df23d5d5e066f912d074c189d60e6d2f87b2b3e2309e0761c2a3c5c5dc0d3821ebc55cdb0cc0c37e3e2015bb6e64fb71aaaf2d36e96c5031afd510fd5393a27c3daee9e8ec542d2ab35a6b0158d26d42886b151fe5cb31f3cdda2c845b844a722405bc4726ab1a3589704f818ca7ccc1664b6b5cfa2e0f00000000000000"]) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) timerfd_settime(r0, 0x1, &(0x7f0000000140)={{r1, r2+10000000}, {0x77359400}}, &(0x7f0000000180)) [ 410.657638] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:33:25 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x0) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d0000000000000007"], 0x39) 03:33:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d0000000000000007"], 0x39) [ 410.890542] SELinux: failed to load policy 03:33:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe6802000000000000"], 0x43) [ 410.929896] SELinux: failed to load policy 03:33:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x8001, &(0x7f0000000400)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x81}}, {@mode={'mode', 0x3d, 0x8}}], [{@euid_gt={'euid>', r0}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}, {@uid_eq={'uid', 0x3d, r1}}, {@obj_user={'obj_user', 0x3d, '![}'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe6802000000000000"], 0x43) [ 411.080280] SELinux: failed to load policy [ 411.123775] SELinux: security_context_str_to_sid(staff_u) failed for (dev bpf, type bpf) errno=-22 [ 411.157296] SELinux: failed to load policy [ 411.181510] EXT4-fs (sda1): Cannot specify journal on remount [ 411.252618] SELinux: security_context_str_to_sid(staff_u) failed for (dev bpf, type bpf) errno=-22 03:33:26 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x0) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe6802000000000000"], 0x43) 03:33:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001000)='/selinux/enforce\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000480)=0xe8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000740)=0xe8) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xff, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="43b04c2ead025519c7f333d74c4835b83067a8f8e74a3c202f69ac0c05bc7897c10c6315700cd70923d74c598e3cac9fcef235af7c244ea2fdbd8542aadbcde6cfb7bd2d2ff66bb00b9d1bea0bd59e79fb162526e7a37c512b670d60c2ffc243edf64132c1c9639cb6f5774445a3c17ac0ba8db4ddfea875e5bee26fe6ddc96d71c37fa1c917054593371572931d0ed2263458774365f904b46283d021c56166060a39efa4263b31142c6952c986f1fce467cfd6b8224f04e68f185c06893b84cbdeee06b52038f0d9724d30", 0xcc, 0x6}, {&(0x7f0000000280)="6afc6cfc6fe1fb1d5c7ded04b9eb29e47216149ed3f1423ccb3338ca7659ab19cd7096baaa1e2bca4326a36ad9e6abf6ed2ed8739fab78e6b37439f0e29a414d19577b664163daf29a7607e1466a", 0x4e, 0x7}, {&(0x7f0000001240)="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", 0x1000, 0x1000}], 0x10000, &(0x7f0000000840)=ANY=[@ANYBLOB='rootcontext=sysadm_u,hash,uid<', @ANYRESDEC=r1, @ANYBLOB=',euid<', @ANYRESDEC=r2, @ANYBLOB="2c7375626a5f757365723d2f73656c696e75782f656e626f3244a7437e28bccd83b5f5121350ee726365142d7569643c", @ANYRESDEC=r3, @ANYBLOB=',euid=', @ANYRESDEC=r4, @ANYBLOB=',\x00']) sendmsg$unix(r0, &(0x7f0000001200)={&(0x7f0000001040)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000011c0)=[{&(0x7f00000010c0)="c6a81229885aa9801f8ed47d14a753d2f0383f53331f4d50c579a2a8897d879cc14ae99915953b7f9c2ebdef5a50844d83f0573662116cbe23d4bb17bf603a8aadebfdbcaf8523e39c5090e53573656e78ef3e33c359af0987bf0fe0d6d9c6050a242ad55a57dcdd2f454bc104ae5121f929d5b0e2d6be3041f7c8fd39c43c8b962fc64c828ba852caf5530a3238180d6c5cf9b88fd2f59c0517ab20724a3d1f4d915d4f75c10fb58e095c3cbce9d155712b549d1919998ecac77f353479183280dafa8a0e707bda7b12b65140773db2c10abbf1e31fb14baeffae65df2068c29b0dd0bd", 0xe4}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e"], 0x48) [ 411.467231] FAT-fs (loop0): Unrecognized mount option "hash" or missing value [ 411.479234] SELinux: failed to load policy 03:33:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 411.575023] EXT4-fs (sda1): Cannot specify journal on remount [ 411.591460] SELinux: failed to load policy 03:33:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e"], 0x48) 03:33:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:26 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x0) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="7a6bc89f3b130e398406b53ca503ff"]) r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) 03:33:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e"], 0x48) 03:33:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e6400"], 0x4a) 03:33:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e6400"], 0x4a) 03:33:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) [ 412.059252] EXT4-fs (sda1): Unrecognized mount option "zkÈŸ;9„µ<¥ÿ" or missing value 03:33:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e6400"], 0x4a) 03:33:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e640000"], 0x4b) 03:33:27 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:27 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e640000"], 0x4b) 03:33:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e640000"], 0x4b) 03:33:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:27 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) prctl$PR_SET_FPEXC(0xc, 0x40000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) ptrace$getenv(0x4201, r2, 0x1, &(0x7f00000001c0)) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000280)={r1, @remote, @local}, 0xc) linkat(r0, &(0x7f00000002c0)='./file0\x00', r0, &(0x7f0000000300)='./file0\x00', 0x400) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e6ee6057eb2b85eb5"]) 03:33:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:28 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000100)={0x7, 0x59a7, 0x20, 0x0, 0x1f}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') socket$packet(0x11, 0x3, 0x300) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r1) 03:33:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB="6a6f3d2e2f66696c65302c00000000000000000000004bcec4f5e9ec458c2318b978c2dd3b3653f9f2bf466e5279e3dc7860054ca3f3f9decf1f1bd43164ea0ec6157209588f6cd294f8128ae2772168bf7963da1a0a5e0e28d2b9c3574e34574a4d7d5fba2d2d578ea12834fe01394fe41585aa703c1d2ceac770e8a5914458e143f56fd86eb1d8e7dbb614ecdf8b7a258b68cfd7ee0c912276895710d0f4304179452669c9b7f3ecab05eac0c80a66f4ebcacda5585ceb28638d2e3e4546f81d999f952e7931015051791849f10dd631252a8ca71c00655dd7"]) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', 'em1-Vlo-^\x00'}, &(0x7f0000000140)=""/67, 0x43) 03:33:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000780)=ANY=[@ANYBLOB="6e61740000000000000000150000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75103b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2951cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a041884dc9f75556ee7da95236205fe0c9161054864ac4a6eebc0b950564b906d2a5810b2e23cb65fe7d0cf47f99f75a028fd2779bd45297d498eb59a9ddb27f30623da2bd720be4383219ce99651cef693d2099f2e2892e5907e47a21c60a1761240c2bd69b2f3916d350b0136adfeb38bac507a315cbad9fff8e77696dcc314b6f43c4f4437693f4a3b0bfcc85a59efcf672fe87cef63f4438b0508a50f40f7ecb73aef41d52b93681e1814508054f4c734ab676fa07e0873a6082ec1cad4e171a20cba9d4d0d2426cb12921040d36d37d4151afbee3933b851fe8955ae45fd429bd5f052c4"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 413.242615] EXT4-fs (sda1): Unrecognized mount option "jo=./file0" or missing value 03:33:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000380)=0x1) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f60000cb07657b07000000402c0000b914000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000080)) r3 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) sysinfo(&(0x7f00000003c0)=""/2) 03:33:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c69531e580cfc4ccf04f7000008f200000700000000000009007bfe68020000000000000000d3729e6400000000000000000000f5000000000000007efc"], 0x4c) [ 413.354327] SELinux: policydb table sizes (2070218699,7) do not match mine (8,7) [ 413.364198] SELinux: policydb table sizes (2070218699,7) do not match mine (8,7) 03:33:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) readahead(r0, 0xffffffff00000001, 0x100) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) fstat(r2, &(0x7f00000001c0)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 413.405836] EXT4-fs (sda1): Unrecognized mount option "jo=./file0" or missing value [ 413.423935] SELinux: policydb string SE LiSX does not match my string SE Linux 03:33:28 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:28 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={@rand_addr="b7d5f79f50a4e210a67ae69c5064d99b", @remote, @remote, 0x7, 0x5, 0x1000, 0x400, 0x4, 0x8, r1}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x40) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$key(0xf, 0x3, 0x2) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") prctl$PR_SET_DUMPABLE(0x4, 0x3) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000340)='/dev/keychord\x00', 0x121200, 0x0) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="3fcfd9dfe3d73515") write$selinux_load(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000100000077bfe68020000000000000000d3739e640000002304c118e5bb404d33ce5e74ce72d757f4f72afbc9e4f00e4cd632c91ecd53916167528d4eccc3c6c5212e495bf83cf20aaf6480f8593a96e90d85c2f09b7fc843db9d74ddd267cf4964cf1722173582aaff3eef3bcacb4803b623b9d6bfe783d8288b2d895e2979c97e6bf301b6da7b28a815b0c0352833d50697ea550a513ec8c72af092f30ea91344a6cb456c8777d173270224a0035580db12"], 0x4c) 03:33:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000040)=0x80, 0x80000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000100)=0x3a2c, 0x4) 03:33:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@multicast1, @in6=@ipv4={[], [], @initdev}}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000240)={0x9, 0x2f6a, 0x58b8, 0x3, 0x20, 0x4}) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080a000053c5204c696e75781500020000f600000800000007ffff00402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e66000000"], 0x4c) 03:33:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x6, 0x4, 0x3}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) openat$cgroup_procs(r4, &(0x7f0000000500)='cgpvShreadd\x00\xfc\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000)=0xf34f, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getpeername(r3, &(0x7f0000000380)=@can, &(0x7f0000000400)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x20, r5, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [{{0x8, 0x1, r6}, {0x4}}]}, 0x20}}, 0xc091) 03:33:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='journal_path=./file02\x00']) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)={0x1, 0x6, 0xa76, 0x0, 0x5, 0x1, 0x0, 0x4, 0x200, 0x9, 0x9, 0xf9}) 03:33:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:29 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@init_itable_val={'init_itable', 0x3d, 0x9}}]}) 03:33:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 413.943188] SELinux: policydb string length 2568 does not match expected length 8 [ 413.974607] SELinux: policydb string length 2568 does not match expected length 8 [ 413.983825] EXT4-fs (sda1): Cannot specify journal on remount 03:33:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4000, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="4634c49710f312551ca9", @ANYRESHEX=r1, @ANYBLOB="8ec74a423ea56f5e83021bb147d002592febc54a03179c7082d20a340c0afde5d62fe804a8a20cc8e0da", @ANYRESOCT=0x0, @ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="700435b44a655e201a0c76f43bc5d6e7589f13ec2386de087afe8291612453123e8a1f31b813"], 0xa2) 03:33:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0x10001, 0x100000001, 0x7, 0x9}, {0x5, 0x200, 0x6, 0x1}, {0xbd, 0x5, 0x81, 0x4}, {0x0, 0x2, 0x0, 0x4be8}, {0x7, 0x7cc, 0x9, 0x2}, {0x6, 0x4, 0x6, 0x345}, {0x5, 0x80, 0x7f, 0x1}, {0x9, 0x3, 0x4, 0x10000}]}) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 414.082382] EXT4-fs (sda1): Cannot specify journal on remount 03:33:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 414.155773] SELinux: policydb magic number 0x97c43446 does not match expected magic number 0xf97cff8c 03:33:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RWSTAT(r0, &(0x7f0000000100)={0x7, 0x7f, 0x1}, 0x7) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f00000000c0)={0x143, 0x936}) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 414.205177] SELinux: policydb magic number 0x97c43446 does not match expected magic number 0xf97cff8c 03:33:29 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) [ 414.374463] EXT4-fs (sda1): re-mounted. Opts: 03:33:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x400, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[], 0x0) 03:33:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r0, 0x2, 0x8) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000040)) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 414.635360] EXT4-fs (sda1): Cannot specify journal on remount [ 414.637926] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 414.691014] CPU: 0 PID: 13995 Comm: syz-executor5 Not tainted 4.14.96+ #19 [ 414.698084] Call Trace: [ 414.700676] dump_stack+0xb9/0x10e [ 414.704227] warn_alloc.cold+0x91/0x1ab [ 414.708211] ? zone_watermark_ok_safe+0x250/0x250 [ 414.713055] ? lock_acquire+0x10f/0x380 [ 414.717029] ? avc_has_perm+0x9c/0x350 [ 414.720939] ? avc_has_perm+0x1b7/0x350 [ 414.724918] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 414.729597] ? __vmalloc_node_range+0x390/0x690 [ 414.734273] ? trace_hardirqs_on+0x10/0x10 [ 414.738519] ? sel_write_load+0x199/0xfb0 [ 414.742674] ? vmalloc+0x60/0x80 [ 414.746040] ? sel_write_load+0x199/0xfb0 [ 414.750188] ? sel_write_load+0x199/0xfb0 [ 414.754350] ? sel_read_bool+0x240/0x240 [ 414.758423] ? trace_hardirqs_on+0x10/0x10 [ 414.762688] ? __vfs_write+0xf9/0x5a0 [ 414.766491] ? sel_read_bool+0x240/0x240 [ 414.770560] ? kernel_read+0x110/0x110 [ 414.774482] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 414.779936] ? rcu_read_lock_sched_held+0x10a/0x130 [ 414.784969] ? vfs_write+0x17f/0x4d0 [ 414.788699] ? SyS_write+0xc0/0x1a0 [ 414.792328] ? SyS_read+0x1a0/0x1a0 [ 414.795955] ? do_clock_gettime+0xd0/0xd0 [ 414.800104] ? do_syscall_64+0x43/0x4b0 [ 414.804077] ? SyS_read+0x1a0/0x1a0 [ 414.807706] ? do_syscall_64+0x19b/0x4b0 [ 414.811783] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 414.820314] warn_alloc_show_mem: 1 callbacks suppressed [ 414.820318] Mem-Info: [ 414.829180] active_anon:66008 inactive_anon:37 isolated_anon:0 [ 414.829180] active_file:18342 inactive_file:18953 isolated_file:0 [ 414.829180] unevictable:0 dirty:3187 writeback:0 unstable:0 [ 414.829180] slab_reclaimable:10189 slab_unreclaimable:54738 [ 414.829180] mapped:58666 shmem:47 pagetables:1199 bounce:0 [ 414.829180] free:1413502 free_pcp:336 free_cma:0 [ 414.863414] Node 0 active_anon:264032kB inactive_anon:148kB active_file:73368kB inactive_file:78612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234664kB dirty:15548kB writeback:0kB shmem:188kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:33:30 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) [ 414.887326] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 414.915153] lowmem_reserve[]: 0 3437 3437 [ 414.919601] Normal free:2574516kB min:5476kB low:8992kB high:12508kB active_anon:264064kB inactive_anon:148kB active_file:73368kB inactive_file:76196kB unevictable:0kB writepending:12992kB present:4718592kB managed:3521428kB mlocked:0kB kernel_stack:4064kB pagetables:4692kB bounce:0kB free_pcp:1432kB local_pcp:780kB free_cma:0kB [ 414.949065] lowmem_reserve[]: 0 0 0 [ 414.952847] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB [ 414.967835] Normal: 1264*4kB (UME) 1040*8kB (UME) 399*16kB (UME) 300*32kB (UME) 110*64kB (UME) 7*128kB (UM) 0*256kB 17*512kB (UME) 38*1024kB (UE) 19*2048kB (UME) 601*4096kB (M) = 2585520kB [ 414.984955] 34479 total pagecache pages [ 414.988973] 0 pages in swap cache 03:33:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) fallocate(r2, 0x40, 0x0, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) ioctl$int_out(r0, 0x25462, &(0x7f00000000c0)) write$selinux_load(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$selinux_user(r4, &(0x7f0000000100)=ANY=[@ANYBLOB='sy/Pem_u:object_r:lastlog_t>s0 unconfined_u\x00'], 0x2c) [ 414.992593] Swap cache stats: add 0, delete 0, find 0/0 [ 414.998003] Free swap = 0kB [ 415.001165] Total swap = 0kB [ 415.004230] 1965979 pages RAM [ 415.007364] 0 pages HighMem/MovableOnly [ 415.011513] 315704 pages reserved 03:33:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e2f66010000002c00"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000180)='--1\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 03:33:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') write$P9_RMKNOD(r0, &(0x7f00000002c0)={0x14, 0x13, 0x2, {0x92, 0x4, 0x3}}, 0x14) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) sendto$unix(r0, &(0x7f00000001c0)="3e3d82ba3072814718c9d2e8e878f3cdf3709e50c7f6eff7de4f8f08dd2b8e5abfd41cafa8512b54d9e7c3b50a9f13d31f06b43d841b1cdd29c54b9f246539897420cd13f67802e2ed8719806b3bd0bd9a3b655927f819963b0e98cb19e18101a678535c839dc4ace11b03f94c", 0x6d, 0x4000, &(0x7f0000000480)=@file={0x0, './file0\x00'}, 0xfffffffffffffe93) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e20}, 0x6e) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x4e22, 0xec3, @empty, 0x80000001}}}, 0x88) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000240)={'veth0_to_bond\x00', {0x2, 0x4e24, @multicast1}}) r4 = fcntl$dupfd(r2, 0x1000000000, r1) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r2, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) 03:33:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 415.214060] EXT4-fs (sda1): re-mounted. Opts: 03:33:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYRES32=r0], 0x0) 03:33:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0xc000000000000000, 0x1, 0x8, 0xfffffffffffffe01, 0x19, 0x8, 0x1, 0x0, 0x4, 0x101, 0x7, 0x8}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) epoll_wait(r4, &(0x7f0000000040)=[{}, {}], 0x2, 0x53) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:30 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 03:33:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x0) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 415.324508] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 415.334924] CPU: 1 PID: 14044 Comm: syz-executor5 Not tainted 4.14.96+ #19 [ 415.341953] Call Trace: [ 415.344553] dump_stack+0xb9/0x10e [ 415.348106] warn_alloc.cold+0x91/0x1ab [ 415.352102] ? zone_watermark_ok_safe+0x250/0x250 [ 415.356963] ? lock_acquire+0x10f/0x380 [ 415.360955] ? avc_has_perm+0x9c/0x350 [ 415.364864] ? avc_has_perm+0x1b7/0x350 [ 415.368851] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 415.373535] ? __vmalloc_node_range+0x390/0x690 [ 415.378216] ? sel_write_load+0x199/0xfb0 [ 415.382360] ? vmalloc+0x60/0x80 [ 415.385710] ? sel_write_load+0x199/0xfb0 [ 415.389838] ? sel_write_load+0x199/0xfb0 [ 415.393989] ? sel_read_bool+0x240/0x240 [ 415.398044] ? trace_hardirqs_on+0x10/0x10 [ 415.402265] ? __vfs_write+0xf9/0x5a0 [ 415.406044] ? sel_read_bool+0x240/0x240 [ 415.410087] ? kernel_read+0x110/0x110 [ 415.413997] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 415.419460] ? rcu_read_lock_sched_held+0x10a/0x130 03:33:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1200008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000240)="56878b1f3badbdac4342b0df7fc4e9a4ae4dbfcde6fa4a87261305abadcedc3f289d0b3133add58869d9d8e5c280d04b2178a1105a49319d5ba4187955fed9fa853f71d4b57e4a9988808e0c44d44b003f8d6294093e25e0fcef68ff43ee93031c015f3bfebce4969f7c534a4f9a87eae2516d2e760ae8b4ed221b59cab257f48c51eb7a632505fc578346ac02cba148cee95f96b5799b9c6ebb9779de378666e28fde451a0d7dff98db2c7719fe74cf78320d7abf011685d9344dfe2edb809788f770ee106338b6326e49dae1892fe1c2d9ecae3a147bf884d28008ec713521fd299e7869b9f5039dd05465a48fcce2aa4b94a83f88d6aa78745466a42da211aedd23802963bb96072e54b426c971b489f18ac0a1ed6c59938242886c876ef89bb015121b92a063734d830ae16118429e48b818a728e99a5f503177f9afa3572a2af3a092ebaa55f06de2a29887b7eda7d2134e48fdf3752750cbd04ae944aa8442a814dbda417f10e8b4b2035b8b0385ee0b934708b9ca6dce6457f2f2a74fcbbd8283890dcea2775c26dc6bfd0da6d36df8c1b1b808ba46f740a42690e32c86c1ef483bba64f03d9630ac7827b14cdd1f80474aefda9933bd725c20f40b76551fbfb17ebd86426deba357121c0efe65a1fd538f67fe0f45dfcb9940503fae8d06911abe310152791dd9d4f79d03dc5a250c5d60c638b9565a656dcd301378df14fc3ee25e0cb9fcbcb3b05bb63ed8bdabc7713737563d361c83b3a3c3da501feb49ce43576f896a4a3319b8ee8643025c97cc74b51478467f4147a0787cb5364a3796ebe33653a99131c709174b2b5e018ca835ff8a913b341aa0f6fb930d7533f14efb06aa37b7d72f4a95348ef2f7430f8f0e2561689215946180e09ab3a191203f411c9122a345b427d8c33dc8c86ccddcccbbaa29468fd57cdb44f893e64442ae3ffc51913bd5038479729122b9e955f986619b61dfa596749a0c2bcd4e3c5b7f042f8579158608c2f7a8dfeec7c34d36bb6671736589446d0a69109a4f511c6179956455928c8ccd64e1980e98ec9d47945ace6f0e1196b80c7d03e66b386a266bddc5d19482d27f6b42008cabec8ebb40f9e4e5ed49bae18cdb4dc7d02e99d7d46fed89ac7ff7653dd3a49d2a0c9a83e2be4ff35ceb52208bee10846ca1d5018669b9b2499ae5e6d66c5b2601cbf2761ec18dafc7fdf8d5f4ac29f9088181b50bf09591c090e8416a67af1cff00f3923c67603db9f9609cd2042c29a20c562a22af88d5b5152076c2992239fb5aa9c7682ab7f173d5bcadd67b1a67f2bb0c60c877109b9628326e039232a065fa938bac337178e206a64e6ebd1c156562fd30d3c7e0ab4a945899cf2610b0bc5ad0a287bdf9f2477adefab49ef7aaab4a46d7438908e9cf8c65b06b1710e3084812ce198250ab4cd230b35e470d1ecf8834d902f84a0b063fbd0ee0bdcae005ec80b5154577f98f07dff37377b855ab6a9d0c78c63c52d190a1ccfe9adab269cd81293fd27f3369771838b57c8131a4bc2659b4e311c91036bf49bd8fcb6aa978ff36c7be23100cae07b217e9e43a3afd0ad5d52b7b8a6b7aae538b3384e7a4d0f2b8ed622ecbae44438c0444b8ce0849ce37e9abf1ca88ed13198b58472f863ad9cae03628ce54f75dc0ee3e4e588333f094aa9e7e6082a49cc5c521a678687f63416052094ccfb1c9286996a0a7d356488f92566a285012513b82fcb0145974f10c55343072c1def5d87969d9b242dc9a11bf19e09c37fba1b6bdf267bf1779271392eeb34f78a50841f563abf7284bf652ca6a138c805057a926ef69c7082581bb3b9e592ab19cb3581a0b8b191d606b84e49bbe8d8097cad69b53658018f9a15973ea39a1db16feab360e342a04852ffbbfa32811c0f5457c194d8b1a1e4104bab3825320daa6eecbc7c17537a3149f6a148d8fb793df2d73f417768f26c9b94acfb91168d4265c3a2fd9fa55153ea7c728daecda4ba5a9805fa9e2e2daa2ccb0f6399e4db5db0d9f079bddb4d15c3b5f349ae971683add332c4965502476a90f56384e455e7b7a9172ee1baff9ea346f32f5e4c9dcb8f3338f19b3a0a8c7e985f7f2942422b0ae2440af265221af9f13bbde09e688e254b8729ca2d50ceca3023b770a5472f4a97832d85a597b24daef8aa3894978ab140bd4270411f1bcd6a2853be3f593269ec5674304cf29055655831b4aa3bf0936827e2bbc4773ed03f342dd8d06075e917e7492fd10cb5fd1e4e37cd3082d41c669c347f13c721654487d0f4e74e4f0a9a3c3276c5ba2521b06b2fe8e5a5f98b5ce8992a17a2323c9b4b08b861ebe72d2a1eaac6c22fac4d632100b0be2f975f25ad5098c63229768e69aa80e555264de5efde1db869e00fb81940802af837524cb2ed205872dd192031d57aaf51f6fecf41d1083a04e2e4c7f3bd1c3b9c00dcf06c4f7d6c07feba321d261c1920d1f45f87848e8bce976ffd330e8bc1c1136c93a7d87deac8dfa7a804ae3ac5edde6a243f7c1f52608fd814ea1bad78df80fba6e9ad850c2d9df663a4293ef59fb41d37ea274cfd7683a4b68f8f0643308e46221c117575e441b12ac89b38e0c82b5e2afec58ddfe240dfec20c227ac502a9154f71db52158af27264d396cb4cae3682bbcd6e3e1a8868681eb3919bcfc43b9acf922def7480240e57a50c293ff613f1d0d914abbfdb8ea7ae506f1906b688496df4502d851b9b1d491c49ace7f9f7212968093490e95193278ac2b9ce4b97e0f7ac88fbfac8a2bbaf04e828dd557240ec8ca409a89bcc3ca690ad0e3ed54de2e10c939faa6907781b384d3a97df1d47fedfbe4cebfe27b3ccfcbe3c0c38b7a0a4a15a2ac25eb627f50ccf3672f81fd5d1d55a3cb009c859ae1a33551598bb19ce8d5c11199db20dd787efff360973a02c5db5884aad0d4e982f265dcc11ee7463975615779f51bf425a8c1487e3b708a2d0e76a780de32ece8a939917eed76d544b8f2de9eac8103a391776edb9ab224727cb35cd3964e2fc075ce043f7c24156e2d18030d65e0bee5a96862ef66301011397fc187ad6799172f0b0e8492c9570fb955c1eacde81e98cdd7520654707bd00f261f8e4ed8000c6ef52da28bf60e4705a46a6a63d9a1036d9369ebff53ba41f19e39e4ce3a96ead924288760b40ca7e2e1f2dcb6581ec3116cccdb0a7efcd8d79b6996e40398826442f330dd2781c086b226f83660e4d740b148e7116169e857de0c9c35a37bcfe0f7ebae71cea04a4dbe169819bcc7705c529748584b037de11fd6047e93149a94aa8c043d879642333750836502f21f9f1b96bec57e6ecab8012ffee9e25f02b17a925bdadf1862aaf94f773876479b237f177fd911a651541b636e76c17b1f411a56ffc731abc20788e0eac9f9e2590f7b5dc85ca40e4cbb2a9e86b21c703debfc98f135985c2186af540348d83034401fd329d2bdc82c8d894802caaa18e0c06a278ca7b9679995308ebea57515397923c0010ab7a2d53af74ce0f0f5c4da1d2a9fbda59c5ced10e8e64c25a3a4f7bd6d2399b68db1ade2aedfabb7314d15b4a1d8256f915e41ebbfed2358b8a56d1d32b282b2efbe0263dfc0bc0178d990f2ed95f26510ec3268177a86b7f093ca426ecd42c280976a8ae847d36bd415c251303fec26865bccb7ebb6767bf056a96e4e288dd8bd758226f1f742fe91c2be036fef1238cfb8846d64371b5159431c0618aa144927fc6e0665f9ec0cc357fad074d8a32175fa8c2275a53e8f5449ea0f448afe29c9f7771a9c23b1cfb38ce4beec3c7caf92ed83ae12a483a2a642290f246ad461cfc55aa82e30324635b0e96de19eb0a0b802811f6c27f493ce4dba683f35b24ecc2be44cf204150cd5459b078d533c252015dffd3e04a2d1afdb7e328019f5fdb5bd865ce27083b3becad3f2bbe1b6631d8d6b03b4999d93d5ca0afd16b83ca5eb716d67fb3e3bfb58c504623ae53e88c126c3b6de3a2495b27c47246cc995461f62edc0a1fc48c15edb7cfe7af63df6df288a5c7db50e2b8a97373f1e1b4a6b136f335811829a7a1482caec517f05a55a8dfc445dea3da3e369036f4c46f08392a8105269f06cbedd192403f1c71be2f9723a1c1d0e0398c443b44d67cd20fe24e3eb9bf87a13d193eede849b48b875b00c2aae7b1f88b4b1c32c0055aaf1eb0e5da584ce018e75f1b8f393a18035a37a226053f7a568b88dc0d458855167c25709569c82caaeb60eed9ec4cf2efcf3ea9e336d2decde1eef2e45165545bfe0236cd0fa8bb4b6cf41edc76acb714f8e49d74425b0f5c95be3f31af3c5e5c4642b4a1af44bc75447bcc68a6524936fe61d75169df6a9e3b110824e28223befe62b9661cb03cf3b2a5a8c9961b41a6f2192fc73d6a6fe21fc764688da1204bcbba88d1b292c296c3f78a05be917437aebb9554af34534db531f819ffdaee431e5636cf1cc0519fba68d746be1054eac117fc51027dce0b86d52976b92d13499ac8a63fd1263f069e7be9694e48d53e3b759e1abd7426ef614283d4d1cbd191175fb42332ca5be0e2a877fd68bef67d3c1a392cb09bbd962d7c91dbf1c4dc5c96d9fd838d64dd3a23c1078a159312872edccd33bcc41b149f2ffe8ecd35fbd58c6eb61a8cf90efbc819bd3ed3152d1e542cda70ae3af0f676d117afcebc59fd31f43948f7265f33bff1ccd50fc8286867c66bc69772c305b2295672eb9aad6e23c11f1b218a20ba6c8f6bb89cb8b5e61100c0b939fdfb6a0db05c8bf198bba1824ef195966573aa1e0b74a4944cbc867ca391380cfb2c9bd41f9739d62a143e9565d26cd36218120242823e3dae2ed7cf31c3713d00639afae12c4a8c8ba9a84cb745d85c21425a20748cf85d6891f2b68c504b07ac7622bf47ef5c5b30fc7cf07168d49bd59dce91a96e329ae9bb2ce7c03f7868106d351f1939aef12c2effb6679b3f5250a28983ff0ed21a0d369b8c2dfd9f455e4517c767fc4c619165216a7d1b86f24465592edd1ce7d781c083318c3160023df19946e54b7e432dc54ccf3a0732bd8f52d855916051eae6c0b435d31b3f88717cebbc9cfe125d65dfa58dd85cd58ec31daf66a00243bfde8a7daccca456ee005801a95e74bc1ef113b4e847ced061f548675f2c8cd338a9acb4851fc234f1a5c108685d3d24e1f2a803c93044417dc8717116a0883e8b2061129f6db73b4b3e0153240b6664c1616d2c3a8997e02279f31540a2aac366ce329cc27c7f8243cb04612285dd1a9a7db45cad3f5d03dec9433919494cadedcf67aa3885c51708ef2353ff89c36e0c892cda821d8f5c38bab0279ef65ff7bf4617ef16b3b89ebc215b285ead75c8002e56d063326dcec58464e392b0d14b9436cfa1960997d8fa1933c79cb2b1eeb3a913d8e2e5b0632b5d1ed442bee2b33c3aab02660866b7ce7a258054e76d5215c643578e3357a9a465ac9facc42613a570ec0d825a0b1999aad8bcde642fcf78bbb316eb62e7314ffcfb201b679d47d24c1068e1c3b77d0a52ebbe3976dc5b9092a7dea8bf68ba5a51d980f935324ced0a5b0fca34f6dcb341ce249a6d1373d8398e84d3bf89d8c66cf96de28fc4031d76477e2dfa42d1dd1de401c59d2e9c5b216fb4ebb41215e7b675226d96297166570430003e776afe0b651759b08223d8020efd100af2997a2102269581c8001c3a60fc0b468fcc5c9c54aa09cb40eb8368ee64a65b8c15c0ff7c7c9ceba6d33191200d5cb47d747b3ca6242b810d2c7c90b2bf12ffdd33ae98e7c4", 0x1000, 0xfffffffffffffffb) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000001240)='/dev/keychord\x00', 0x4400, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000001280)) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007210000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000180)={0x0, @speck128, 0x0, "5f4b62d0848bd39c"}) [ 415.424474] ? vfs_write+0x17f/0x4d0 [ 415.428171] ? SyS_write+0xc0/0x1a0 [ 415.431790] ? SyS_read+0x1a0/0x1a0 [ 415.435419] ? do_clock_gettime+0xd0/0xd0 [ 415.439563] ? do_syscall_64+0x43/0x4b0 [ 415.443517] ? SyS_read+0x1a0/0x1a0 [ 415.447127] ? do_syscall_64+0x19b/0x4b0 [ 415.451170] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r4, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r5, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 415.598693] sel_write_load: 24 callbacks suppressed [ 415.598697] SELinux: failed to load policy [ 415.615116] SELinux: failed to load policy 03:33:30 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x0) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:30 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x1, "38612907990fa1b3"}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bond_slave_0\x00', 0x6}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)) [ 415.870911] SELinux: failed to load policy [ 415.878238] SELinux: failed to load policy 03:33:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x0) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f31f2ef70") write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES16], 0xfffffffffffffdb0) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000000980)={&(0x7f0000000540)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000900)=[{&(0x7f00000005c0)="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", 0xff}, {&(0x7f00000006c0)="5c66f5204e725f85a79aafdeb3dcb1a459180e11b8a06632ad16c5158e15b0a2f7ae5043c1105aaaac2e74398fab8005f97089ca1bf5bac4b9a7f27bd5ff25927f646883385229712858be3ca370ab1d46eb3bcb92cf583f8eb00e2764faca53ebec0b3dc684d08d2752dea8eb155e9f5839da50724f02427603c7d925088b92907868c99e8b0fdaaa76279febcfb2f86f35ab1e7bd8ef60b429269b126ec337d15e4fb655d4fd1fb8", 0xa9}, {&(0x7f0000000780)="ee290da16a793f080ff8f2f4a01d4f1f4e700dfd1fc7f6885d4e7b6b35a347b12bc6bf8c983793c902234533380d043c3b2a6996fad997e88e933c0b11f35cba11f62d7498f5049be84f329e61d4c849cd7ce09c83cb932a98ab4fbf681e49781ffb35af07bbdbee3728140fdb2b06435935646fee9c605d07a49af3e2b952580b5c63d266235cf4e36f5964928c7cdfdb0ec9cc2803695901e940c5fa1994008dfd8b9c355de842a00bcc2f0475e2553beb881bb692fbd5e4b89fad007d08ca236d54d079319f0c37eec585d6476cd47bee35da", 0xd4}, {&(0x7f0000000880)="0279d69d6e0b9d6a453515a3580774937d54bfbc712aa1e433d217de4eb847a404442dad4748f86f92b5085bcf01fc6c8773a78606f0e5f74ab53ee2af5b271c08138c16ba9094863a2e55e594ba4ea94471ad88d96e6f9834b5cff6dbf67f0c5a8531fccac5899a758eb1cdc6903fd2f24e6f271b7486fbe25b", 0x7a}], 0x4, &(0x7f0000000940), 0x0, 0x2004c014}, 0x80) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$unix(0x1, 0x400000007, 0x0) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000140)="3dbf75bf6d782ffbfce33beb45d817e623d1ebe74d3479f1d505485817287d97d325bf31344c732c1af75a501522a005db63986257f52bb9b6b61bc502f25a98206ccd0f24d8f5a5be74ac28602275db1791c69fba4ceaffb0641221", 0x5c}, {&(0x7f00000001c0)="ee468d15d800e919221a209affe8089fc4ef32dd7e28beecdc8d85a8d50f096da256d877e959420ced009eda3143f340a22f798dce99f46d298e0679a29e38a96474d43f890b689e1f2f04990cf47d79d5f5b1e4beb90aad00faede67eb43c6744559328b914b1f7a815bf1e250258213336019417e9cb55c747d3bee86df4a0", 0x80}, {&(0x7f0000000240)="e856b6f6ff0400a9079594c77403ce2a5277327c50eac82969f066f33bc58656e6ce352ceb6c985516ed0cc424b667a2d6ce6ff09b08fd0be14bf53771910725f781691535962c3501549ea7f5da3328d0c8fc7437f694095c01aba137600457e0354efec85c4ad7c478798066d6d5c690f891320571367134bf273e562374ff5537aa9f98c26d855eaa43296cf587d9cb02536dbefa8d5482030131c1a734f3db5de1e1464c27ef552c61e2a5748cd34c7e9369c9b1f991f565cf24f19ea2328027cae5fbbe63cdeb1dbe622218a50a16", 0xd1}, {&(0x7f0000000340)="4913b7c8e43bf4eaf286321ff3345881d1ef5141ca9842b32d931b912945b25c42a974c4a8064c0cddc204263559b49a9da72afd0e0f60836b792b1874b4ad03d9f4352bdacd91606b3b29546e81c9a2e496f29e1e3d9e4ff7f66e45346578f137507bf32377328cb95727e41e8eb05efee04112b94c133c75490d7c4c297d4f9f972093cf86f7c5583b2be4bd1e7c8a1bf1ab9abb3d268a70182464f6e2af533f194238a5103331dca3954a85fd70c12d0255715c79973e2479f55fe6a36c24906dc7b6de76d2c1c0401a460bff4fc69ad9f1e7a49726a2369c0bcd5632520c9bfd0243b5581ebb7bc5e059e3715788", 0xf0}, {&(0x7f0000000040)="a5b956884500083068d23a73b4e4ab2375efb6703f5169a6bbe2172f0913643451c7cd4494af", 0x26}], 0x5, &(0x7f00000004c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18, 0x20000810}, 0x0) [ 416.075175] SELinux: failed to load policy 03:33:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x200, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000180)={0x34, 0x0, &(0x7f0000000100)}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10001d, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)) 03:33:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="000000f3ffffff00ce8de35f13873374de3be836788f5815cf8c005000556722b6e0317012cb10adb38d302bf8a7e702a47d342439f41236d4956d3bf757202a7d37b4009174cab4539532ec90e233c5a375611c919871b34b81fc80fbf42f4b7dc296f8b9e8750d221747cf8108324f96349b24ace351e89e25e0f528c74b8fe073d25bea0b682f3bb301000000") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:31 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) 03:33:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) io_setup(0x0, &(0x7f0000000040)=0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x10001, r0, &(0x7f00000000c0)="a7aea3de19b55fc9106c9fd0f7adcb975c7f7e9422ab58113ecc06161e9ef344a57670dbbd59d075f62afe302a5d0b49c71c32b5d6c38038f99570abffa73dcff7dd80a5b298d79cae355aac3f19732c98eab634c9f7ef734a6db900224341e24fd5795c197021d0c90bf5c5a308d195eed1326339f165f584", 0x79, 0xc2, 0x0, 0x0, r3}, &(0x7f0000000240)) [ 416.424676] EXT4-fs: 3 callbacks suppressed [ 416.424685] EXT4-fs (sda1): re-mounted. Opts: [ 416.439805] SELinux: failed to load policy 03:33:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000340)={'nat\x00', 0x0, 0x3, 0x64, [], 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000240)=""/100}, &(0x7f0000000040)=0x78) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000003c0)={0x34, 0x0, &(0x7f00000002c0)}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000400), 0x10) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x12e, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f758d6e616c5f706174683d2e2f66696c65302c00"]) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) recvfrom(r0, &(0x7f0000001200)=""/4096, 0x1000, 0x20, &(0x7f0000001180)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @remote}}, 0x80) 03:33:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)) 03:33:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='wlan1>cpuset^\'!^.md5sum#\x00', 0x19, 0x2) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x1) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 416.598981] SELinux: failed to load policy [ 416.619139] SELinux: failed to load policy 03:33:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101001, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000100)=0x100000001) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:31 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) [ 416.812107] EXT4-fs (sda1): re-mounted. Opts: 03:33:31 executing program 5: r0 = dup(0xffffffffffffffff) recvfrom$inet(r0, &(0x7f0000000080)=""/213, 0xd5, 0x2002, &(0x7f0000000180)={0x2, 0x5, @multicast2}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) sync_file_range(r1, 0x381d8983, 0x1, 0x4) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e06781500000000f600000800000007000000000d00000000000000077bfe6802000000000000005a64a15b64000000000000000000000000000000000000"], 0x4c) [ 416.832315] SELinux: failed to load policy [ 416.841264] SELinux: failed to load policy 03:33:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable'}}]}) [ 416.996311] EXT4-fs (sda1): Cannot specify journal on remount [ 417.019235] SELinux: policydb string SE Linx does not match my string SE Linux 03:33:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f00000001c0)=""/218) ioctl$RTC_ALM_READ(r4, 0x80247008, &(0x7f0000000040)) fcntl$setflags(r4, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$TIOCGPTPEER(r5, 0x5441, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r5, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) connect$unix(r2, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x4c) [ 417.065151] SELinux: policydb string SE Linx does not match my string SE Linux [ 417.074706] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, [ 417.097490] EXT4-fs (sda1): Cannot specify journal on remount 03:33:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x17, 0x2, 0x6) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000007c0)={@in={{0x2, 0x4e20, @loopback}}, 0x0, 0x100, 0x0, "adbfd65016294b384cacd3121dbde31865c17eaf9f9a52b51548acc2f592f3d88dafaa09965e1bd1bbaf363dc7b6ad158f5d06b0c6be30d725b2bf3cabb68b7f6b03eaacb18cb9c2b2044a9828a14531"}, 0xd8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) pwritev(r2, &(0x7f00000006c0)=[{&(0x7f0000000080)="2f52f1d3c590bb47935ad822b33b30a9d5af48e25b0e0963838c61d20640517fa6c62552eb8b47bdc79fa95c478fabf8e440ad81d4cc6dcbe2f6ee26b87a6a1f96bc46d9eba5b1f6468975127b440b986dca69dbcb2e99f7b9bd253eb8dbeeca90d5b3540e79eea9e6ff3a0f44e643770ff16ff25b1f1113d85c63fbcdc581a16e4d4e957722875393ef587ef38e3593c927589a3eaf5dd238ae466b90f0420baa207d13a565d0fb41f03bd6bc5a7e057dff473bbb875ac85374fd8c91c553fbd2a9da36f9d1c52e04ef151bf3eec57dd7cc94a40ba0bae5a70c42e96ff4", 0xde}, {&(0x7f0000000240)="08922bae512f8fa168421e335bbceda025833c37a2ffead742604e12b58a54324a83562300cd6d80b5f5bdf7438ef7c788e36e931efaa42ecf065d51178055ed00d2d72f6ffc57a0337b93077f4ee8dea6c54983558f3915cb2c7ad0e3dfe5742fb4be3d9f57e7bf00fceb60aa9d20708fc8661b8a8968f14f88517914ac1c105878ab4dd232a8c469180d7ff9b5afd9c4224a5725ca1d7885edf94546a085f4666931165fe5d54d28515d2df2c6ce3c4891b677768b9123f3d1c5eddec6a65066d913079d7e64c2ac6f33e610125ebeddebb51ffe7556da37c4ff496a5e7aafcc5195b8e18e83c815505d18ae5976", 0xef}, {&(0x7f0000000340)="3ad73b75cae5e2769dc6920519a1a92aa91f2758ba766cbb7d4abfc48cca84d443bc88a9853910bbcd4ee758f6cbc0cfe2a7e86a10172fcc620ca5e7ce7a0abc998ba8494e43c28955619fdf0cfaf4e0938ff9a3f633e963bdaddb5fe2e56a25b3503a82073655fe68f68bd225f7bb95ce72f4003dce26f8c0902c60", 0x7c}, {&(0x7f00000003c0)="e36d2d6a75e45d724b70dc4f89cd7261628df7d7d11dc3ca713b8da9bd81cb593ad3b95636b535253c1e4dd1795b76fe170dd69ee292bc22e13588f03e85c5a2e8", 0x41}, {&(0x7f0000000440)="2ac8cc3c4e0ad797125d8b82217d5c286dd21a98064d09f9773470b941a542a1943821e7ea280ed5daa3347231f92f0ea75c56154608e68de16e6b1fbeadb4c9f467e02c111d229a50c7c47060f45d5f8f09b93d606a2bfb26cf41fa4369597df99069bdd74b6d8dcb6fad489779a88d84ea7574e77728cdecd5f513fc8b6901b1be8515", 0x84}, {&(0x7f0000000180)="60a0b9785441b66b50d74d3d58de7c44261cb7d98f98eb3449de4a0376d2d2b2c38c4feb7795d4", 0x27}, {&(0x7f0000000500)="236f787332c3b378734a7bf7cc7172ded7802f750a761a8192593b97066dfbd7f699522f42b46b46515555d0f6acf27c00edc928c2530dffab829e316943b5aed6e9b1b9439e9cb958023b489b6365d8f85de99cb21868d6b3b47a6125dd546beac8c928afb475b782ec53e93d07e6915e21a2e98061b515888ce8658e77744a59a13af46a21c384b46856bc891ff92b1fe1430e8c4f8612d6d5d450d50c9a9f428f31893e10e9688d105627d76ae8f0b2fd8b024e48f2a176351b0d4b06d7e1bc3dd9f0be5c80ec8a4c", 0xca}, {&(0x7f0000000600)="771de35e223a7430e187479ca247a8b46cf8857ad4d672d50c81d7c283f58f18f1e01bbc30b4f5a40f4940be610439b8138c0455b6bef31d92775056d3bfbb525cae0504332a46c2191ca943331a5e9eb5db83f6074d9182af5de9fb9d16d523afb6491ab923a890e19478414535e95fef4fe8afe95087d59eb2efe416a75282a4c5bde42ce819afcf71c1b113970abb8f63a3a71f55a92cdf78778ef497e88e8f5339c95c143a04fe3d4229e44fe1e015d903552993", 0xb6}], 0x8, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x6) write$selinux_load(r2, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x4c) r4 = fcntl$getown(r0, 0x9) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/mls\x00', 0x0, 0x0) ptrace$setsig(0x4203, r4, 0xd84d, &(0x7f00000001c0)={0x2a, 0x100, 0x100000000}) sync_file_range(r3, 0x0, 0x7, 0x0) 03:33:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x100080000000002, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write$uinput_user_dev(r3, &(0x7f0000000bc0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r3, 0x5501) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000280)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [{@measure='measure'}, {@fowner_lt={'fowner<', r1}}, {@subj_type={'subj_type', 0x3d, 'journal_path'}}, {@euid_eq={'euid', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x35}}, {@euid_lt={'euid<', r1}}, {@fowner_lt={'fowner<', r1}}]}) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000340)='/dev/keychord\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000380)='euid<') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) [ 417.163394] SELinux: policydb table sizes (2162696,7) do not match mine (8,7) 03:33:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0xdf, &(0x7f0000000040)=0x7, 0x4) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685) [ 417.291323] SELinux: policydb magic number 0xd3f1522f does not match expected magic number 0xf97cff8c [ 417.305604] SELinux: policydb magic number 0x1f9b3b42 does not match expected magic number 0xf97cff8c [ 417.331288] input: syz0 as /devices/virtual/input/input17 [ 417.347944] SELinux: policydb magic number 0xd3f1522f does not match expected magic number 0xf97cff8c [ 417.369708] SELinux: policydb magic number 0x1f9b3b42 does not match expected magic number 0xf97cff8c [ 417.428766] EXT4-fs (sda1): Cannot specify journal on remount 03:33:32 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) 03:33:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r5) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8ca, 0x40, 0x3, 0x10000, 0x3, 0x3, 0xffffffff, 0xaf, 0x40, 0x32, 0x100, 0x0, 0x38, 0x2, 0x436, 0xf267, 0x480000}, [{0x6474e555, 0x8000, 0x400, 0x10000, 0xff, 0x2, 0xeb07, 0x5}], "a696033956ddcdd8e2d7c42e74e8f27e3e54793ccd7e55b635bfdeae601bcec4c5996b0728b57ecbd07abcede0e128a70c259f09ece991a4ae907472508caa1685f342acc4ba13ae0a3bddfa4872fe55aef9670c80f6bd344af2ddfe43cbeadb726e617655224b81fb78a3a83c0ab864d3e47ca8874853f7a0ac8031228cc5f9513a756b3f8f5233ffebb46d01a9e9de08", [[]]}, 0x209) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x220001) fgetxattr(r0, &(0x7f0000000480)=@random={'os2.', 'vlan0\x00'}, &(0x7f00000004c0)=""/254, 0xfe) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="2cbe44e52d9716b0224e2b3d1ff7060000006a250eff0810bdd3028e98d889f45094f1bb69c529ddcf6d165fe0db40073bcbdb6431eb31a258787bbcbc9da8d95358f9cc49b55a878ce05b8c90baad2d759240f27a94e4133b6fa46c91f2f47684", @ANYRES16=r3, @ANYBLOB="10022dbd7000fedbdf250100000000000000024100000010001369623a766c616e3000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) write$selinux_load(r1, &(0x7f0000000100)=ANY=[], 0x0) r4 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000005c0)='dns_resolver\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='\x00', r4) 03:33:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 417.529016] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 417.539184] CPU: 0 PID: 14259 Comm: syz-executor5 Not tainted 4.14.96+ #19 [ 417.546206] Call Trace: [ 417.548807] dump_stack+0xb9/0x10e [ 417.552365] warn_alloc.cold+0x91/0x1ab [ 417.556352] ? zone_watermark_ok_safe+0x250/0x250 [ 417.561205] ? lock_acquire+0x10f/0x380 [ 417.565185] ? avc_has_perm+0x9c/0x350 [ 417.569085] ? avc_has_perm+0x1b7/0x350 [ 417.573068] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 417.577753] ? __vmalloc_node_range+0x390/0x690 [ 417.582423] ? sel_write_load+0x199/0xfb0 [ 417.586575] ? vmalloc+0x60/0x80 [ 417.589923] ? sel_write_load+0x199/0xfb0 [ 417.594059] ? sel_write_load+0x199/0xfb0 [ 417.598190] ? sel_read_bool+0x240/0x240 [ 417.602249] ? trace_hardirqs_on+0x10/0x10 [ 417.606490] ? __vfs_write+0xf9/0x5a0 [ 417.610279] ? sel_read_bool+0x240/0x240 [ 417.614332] ? kernel_read+0x110/0x110 [ 417.618223] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 417.623656] ? rcu_read_lock_sched_held+0x10a/0x130 [ 417.628664] ? vfs_write+0x17f/0x4d0 [ 417.632379] ? SyS_write+0xc0/0x1a0 [ 417.636000] ? SyS_read+0x1a0/0x1a0 [ 417.639632] ? do_clock_gettime+0xd0/0xd0 [ 417.643774] ? do_syscall_64+0x43/0x4b0 [ 417.647730] ? SyS_read+0x1a0/0x1a0 [ 417.651349] ? do_syscall_64+0x19b/0x4b0 [ 417.655424] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 417.663292] warn_alloc_show_mem: 1 callbacks suppressed [ 417.663294] Mem-Info: [ 417.671166] active_anon:66793 inactive_anon:39 isolated_anon:0 [ 417.671166] active_file:18342 inactive_file:16107 isolated_file:0 [ 417.671166] unevictable:0 dirty:142 writeback:0 unstable:0 [ 417.671166] slab_reclaimable:10461 slab_unreclaimable:54061 [ 417.671166] mapped:58623 shmem:49 pagetables:1117 bounce:0 [ 417.671166] free:1416264 free_pcp:324 free_cma:0 [ 417.704839] Node 0 active_anon:267152kB inactive_anon:156kB active_file:73368kB inactive_file:64436kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234488kB dirty:568kB writeback:0kB shmem:196kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 417.728260] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 417.754971] lowmem_reserve[]: 0 3437 3437 [ 417.759185] Normal free:2585320kB min:5476kB low:8992kB high:12508kB active_anon:267152kB inactive_anon:156kB active_file:73368kB inactive_file:64436kB unevictable:0kB writepending:584kB present:4718592kB managed:3521428kB mlocked:0kB kernel_stack:4128kB pagetables:4468kB bounce:0kB free_pcp:1296kB local_pcp:604kB free_cma:0kB [ 417.788324] lowmem_reserve[]: 0 0 0 [ 417.792621] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB 03:33:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 417.825826] EXT4-fs (sda1): Cannot specify journal on remount [ 417.833205] Normal: 1331*4kB (UME) 1058*8kB (UME) 443*16kB (UME) 310*32kB (UME) 116*64kB (UME) 12*128kB (UM) 3*256kB (M) 17*512kB (UME) 38*1024kB (UM) 19*2048kB (UME) 600*4096kB (M) = 2584652kB [ 417.865389] 34486 total pagecache pages 03:33:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0xfffffffffffffe01) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 417.880186] 0 pages in swap cache [ 417.895800] Swap cache stats: add 0, delete 0, find 0/0 [ 417.902583] Free swap = 0kB [ 417.905730] Total swap = 0kB [ 417.908866] 1965979 pages RAM [ 417.912770] 0 pages HighMem/MovableOnly [ 417.916944] 315704 pages reserved [ 417.942755] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 417.958349] CPU: 0 PID: 14264 Comm: syz-executor5 Not tainted 4.14.96+ #19 [ 417.965375] Call Trace: [ 417.967975] dump_stack+0xb9/0x10e [ 417.971538] warn_alloc.cold+0x91/0x1ab [ 417.975527] ? zone_watermark_ok_safe+0x250/0x250 [ 417.980399] ? lock_acquire+0x10f/0x380 [ 417.984389] ? avc_has_perm+0x9c/0x350 [ 417.988290] ? avc_has_perm+0x1b7/0x350 [ 417.992279] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 417.996966] ? __vmalloc_node_range+0x390/0x690 [ 418.001646] ? sel_write_load+0x199/0xfb0 [ 418.005799] ? vmalloc+0x60/0x80 [ 418.009171] ? sel_write_load+0x199/0xfb0 [ 418.013323] ? sel_write_load+0x199/0xfb0 [ 418.017487] ? sel_read_bool+0x240/0x240 [ 418.021563] ? trace_hardirqs_on+0x10/0x10 [ 418.025816] ? __vfs_write+0xf9/0x5a0 [ 418.029619] ? sel_read_bool+0x240/0x240 [ 418.033682] ? kernel_read+0x110/0x110 [ 418.037592] ? rcu_lockdep_current_cpu_online+0xed/0x140 03:33:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="8100000000000000681df2ab8bf49e07002e66"]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x2) 03:33:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf90000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68e7ffffff0000ebff00d3739e64000040"], 0x4c) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000000c0)=""/194) [ 418.043047] ? rcu_read_lock_sched_held+0x10a/0x130 [ 418.048074] ? vfs_write+0x17f/0x4d0 [ 418.051796] ? SyS_write+0xc0/0x1a0 [ 418.055425] ? SyS_read+0x1a0/0x1a0 [ 418.059068] ? do_clock_gettime+0xd0/0xd0 [ 418.063222] ? do_syscall_64+0x43/0x4b0 [ 418.067193] ? SyS_read+0x1a0/0x1a0 [ 418.070824] ? do_syscall_64+0x19b/0x4b0 [ 418.074894] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:33 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) 03:33:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000004ac0)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000040), &(0x7f00000001c0)=0x4) recvmmsg(r0, &(0x7f0000004740)=[{{&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/48, 0x30}], 0x1}, 0x7}, {{&(0x7f0000000440)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000004c0)=""/26, 0x1a}, {&(0x7f00000006c0)=""/52, 0x34}, {&(0x7f0000000700)=""/152, 0x98}], 0x3, &(0x7f0000000800)=""/153, 0x99}, 0x1}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f00000008c0)=""/203, 0xcb}, {&(0x7f00000009c0)=""/179, 0xb3}, {&(0x7f0000000a80)=""/167, 0xa7}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/192, 0xc0}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/16, 0x10}], 0x7}}, {{&(0x7f0000002d40)=@nfc_llcp, 0x80, &(0x7f0000004140)=[{&(0x7f0000002dc0)=""/3, 0x3}, {&(0x7f0000002e00)=""/215, 0xd7}, {&(0x7f0000002f00)=""/76, 0x4c}, {&(0x7f0000002f80)=""/4096, 0x1000}, {&(0x7f0000003f80)=""/159, 0x9f}, {&(0x7f0000004040)=""/219, 0xdb}], 0x6, &(0x7f00000041c0)=""/29, 0x1d}, 0xd04}, {{&(0x7f0000004200)=@can={0x1d, 0x0}, 0x80, &(0x7f00000045c0)=[{&(0x7f0000004280)=""/250, 0xfa}, {&(0x7f0000004380)=""/94, 0x5e}, {&(0x7f0000004400)=""/91, 0x5b}, {&(0x7f0000004480)=""/54, 0x36}, {&(0x7f00000044c0)=""/193, 0xc1}], 0x5, &(0x7f0000004640)=""/218, 0xda}, 0x80000001}], 0x5, 0x40000002, &(0x7f0000004880)={0x77359400}) accept4$packet(r0, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004900)=0x14, 0x80000) sendmsg$nl_route(r0, &(0x7f0000004a80)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000004a40)={&(0x7f0000004940)=@bridge_setlink={0xf0, 0x13, 0x0, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x20000, 0x4800}, [@IFLA_LINK={0x8, 0x5, 0x9}, @IFLA_PHYS_PORT_ID={0x24, 0x22, "16ba3217d9ceec3e432a5c2102e8ae90d81683f50cd04b289bdc35e13dec0a"}, @IFLA_PHYS_PORT_ID={0x24, 0x22, "db014e8c233a83eafbbb60dc59a83a0075d424b0136cb65b28c82eb96c2894"}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x2}, @IFLA_LINKINFO={0x6c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x5c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @ipv4={[], [], @local}}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="83826f11b4be084ce64a46ce827c10f2"}, @tunl_policy=[@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1}, @IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x1}, @IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x3}, @IFLA_IPTUN_LINK={0x8, 0x2, r2}, @IFLA_IPTUN_LINK={0x8, 0x2, r3}]]]}}}, @IFLA_BROADCAST={0xc, 0x2, @broadcast}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) fcntl$notify(r4, 0x402, 0x4) fcntl$setflags(r5, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r7) setsockopt$packet_int(r6, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="017eab845c1be97f88b07006f57019e498ce205afb2cf70e7d5d3ff90d682a5b7d83909a6b608f948adb7cc5781c66e7da5023637284ddfe4cc159304b2df6b9a9028407c127cf623d417845ddd320a6eb087cf3f54a20608238a0a5d99987135dc568dad53f3e2ad540ae660a9fcb3c6b100eea2dfb052a6d94123da914e33d85e3ea37b2e8475e0f36d8fb8a16a89839d12c06cff1bb116df40c9469e10b9b7613f4091d7859ef8efbf8a1c6bc378a0399f144f8f77922b02d391ec6feba0000000000000000") ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e24, @rand_addr=0x8}, {0x2, 0x4e21, @rand_addr=0x20}, {0x2, 0x4e23, @multicast2}, 0x8, 0x0, 0x0, 0x0, 0x100000000, &(0x7f0000000000)='vxcan1\x00', 0x1, 0x5, 0x6d}) write$selinux_load(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff0400000000000000204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe48020000000000000000d3739e64000000"], 0x406) [ 418.427748] SELinux: policydb string length 16121856 does not match expected length 8 [ 418.438256] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 418.463709] SELinux: policydb string length 16121856 does not match expected length 8 03:33:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x6e) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) r5 = getuid() ioctl$TUNSETOWNER(r4, 0x400454cc, r5) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0xe9, 0x1ffffffe, 0x0, 0xfffffffffffffedb) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:33 executing program 5: socket$nl_route(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x40, 0x80) r2 = dup2(r0, r1) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000400)=""/235) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4008000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r3, 0x624, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x81}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xffffffffffff7fff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7f}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xff}]}, 0x64}, 0x1, 0x0, 0x0, 0x40001}, 0x8000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f00000003c0)={0x17, 0x3e, &(0x7f0000000380)="1653662260b6a139565f23e2c9899e7972256f7ba2452969c676e3ac5bdd9b9a0c36fbce8508a72398d578c12a4fe0cdfa2f050f62e22f6f2e354467759f"}) write$selinux_load(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:33 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) 03:33:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 418.704332] EXT4-fs (sda1): Cannot specify journal on remount 03:33:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable'}}]}) 03:33:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfdca9c74e2a5fe68020000000000000000d3"], 0x4c) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x8, &(0x7f00000000c0)=""/158) 03:33:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x188003, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d000066696c65302c0022d092cc5473d61b5d0eb0ff6f69ab9e1df2e9629e0d1e490a7285458b9d533af924aee698b7dd904aa96813483c9e5ca633428a9fc947b94c8066abad35dd163402dae21e992c18b45335bdace28b436e82"]) 03:33:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@broadcast, @remote}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x3) fcntl$setflags(r4, 0x2, 0x1) pwritev(r2, &(0x7f0000001b40), 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) setsockopt$packet_int(r5, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(r0, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x1f) [ 419.084729] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, 03:33:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000002c0)={'nat\x00', 0x0, 0x3, 0x45, [], 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f0000000240)=""/69}, &(0x7f0000000180)=0x78) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000100)) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000340)={0x7000000000000, {{0x2, 0x4e24, @multicast1}}, 0x0, 0x6, [{{0x2, 0x4e22, @local}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}}, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}}]}, 0x390) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/enforce\x00', 0x200000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) fchownat(r2, &(0x7f0000000740)='./file0\x00', r3, r4, 0x1800) 03:33:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="6a6f75726e613a61813eb4a81c556c5f706174683d2e2780616091a0589ac9ed8e32e3d4db4746667fca353dd810e6755eacde0d15d9e81ff56d7d085ced3744b1a04d4cde633c8f8a0d19c583f410be2baa794e40c5e4564e53abe89f8cadc16f1248b2f10ca669cd760276ada6875d63151e5254bd6708d40d9fc695fae55241ffcf4c2e9da1696568eeef1ab49f347874b3d883200200000000000000fd4b970e0e869542fb3a94901ddb31d2626447b1d06e9b2079bf9e70a46685d06823964ec389a5f9dc70c75297b39e06dd9b883a7acd6ebff771e6488c179c5783e6dc200cc323df5a61af53709ab6d8dc89dacde15bbbc2ac54873c99f789e53bdb1ec5aa05fa9727cb05a676d2315eb09777ee9e4749088ea9b43a55986bef"]) mkdir(&(0x7f0000000040)='./file0\x00', 0x1) 03:33:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d764", 0x38, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:34 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) 03:33:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) mlockall(0x1) 03:33:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000001c0)=ANY=[]) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x402000, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) 03:33:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) flock(r0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000001c0)=0x30) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000200)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d764", 0x38, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:34 executing program 0: unlink(&(0x7f0000000040)='./file0/file0\x00') r0 = dup(0xffffffffffffff9c) write$P9_RWSTAT(r0, &(0x7f0000000300)={0x7, 0x7f, 0x2}, 0x7) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB='journal_payh=. \x00ile0,\x00']) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getpeername(0xffffffffffffffff, &(0x7f00000004c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000540)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f00000006c0)={&(0x7f0000000000), 0xc, &(0x7f0000000680)={&(0x7f0000000580)={0xd8, r2, 0x511, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xbc, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x101, 0x10000, 0x101, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r5}}}]}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000002c0)=0xff53) 03:33:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f00000001c0)={{0x7e, @empty, 0x4e20, 0x3, 'fo\x00', 0x2, 0x9, 0x4d}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x4e22, 0x4, 0x9c3d, 0x4, 0x3f}}, 0x44) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d764", 0x38, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0xc) ptrace$peekuser(0x3, r0, 0xfff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable'}}]}) 03:33:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x1c) setsockopt$inet6_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000240)="b59b605d068b8d7b5312c6f9ad53147627a44f86fc38f54344081247b54f912cd1a0bd7898d5b65fcd98c34495886e83e1a8d7413c7b0fb41275eaf87e2fbbeeff63b619b5d6d023b4ac78a9b8e5da58178524ba8eeee66263ec62caae966c0e01567172439f207ae18486c6d91f632bbe72f259f96f7259f608a3d8dda981ec50aad5a8a8c7bbf131515a3f51ce48892a466e4962d63a1101ef5900af311df7d0322d9d1663996495f69d6167ad979d8e9acfaac05c2f087a520983f86458365effc60cbf93c2718553b43626fe58128cb4300d3849136b0387dbdafe76deea109ec7ef876c2abf74", 0xe9) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='journal_path') 03:33:34 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 03:33:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449", 0x54, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20c41, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000002c0)=ANY=[@ANYRES16=r0], 0xfffffffffffffdef) 03:33:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000e1000000da1c049948ec2e393019dee862429d922ac79c597f15c17d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a0400000000000000000000000000"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x2000000008000) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x1a, &(0x7f0000000040)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe680200d3739e64000000"], 0x4c) 03:33:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449", 0x54, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@init_itable_val={'init_itable'}}]}) io_setup(0xffff, &(0x7f0000000240)=0x0) r1 = signalfd(0xffffffffffffff9c, &(0x7f0000000280)={0x9}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.current\x00', 0x0, 0x0) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x300, r1, &(0x7f00000002c0)="048073a094532e4da65205b3c953a8de275a558cc791d58bb634ac58286a4dc80365b76ee472b5b56cd022d5e249783719131d01e358ef199612af305eb71d883fbb1975c77613c4ee2415b7080d885624e94c3abbc28755b264873c7f46754e3988a60875b93e4cae2df6f33e25a8c84f12cdc7df4e8741c780ada1f19269d4fd1941d2ca2cb6ec3d9d92c3cfdc0e", 0x8f, 0x8, 0x0, 0x0, r2}, &(0x7f0000000400)) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000140)={'batadv0\x00', 0x600}) 03:33:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = creat(&(0x7f0000000080)='./file0\x00', 0x8) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) ioctl$FICLONE(r2, 0x40049409, r0) 03:33:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000180)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0xb7, 0xffffffffc1065641, 0x9e9, 0x31, 0x7ff, 0x8, "fb53c462e84a46385e54cd2a015d0e884e95f850cb7f5716f518c251a6b00b30d93e0df03c885e1e44d2ab1e501062e48b01511077d8269ce79ba56487e9aee9e0cc9d84f138b25a364fa3490591afdfc4241df62a0f741344538b63623d26b6bd8bce57f882e1b8af6e3bbdefa52c2c1ec1a56a6233d803259fdc39cd2b47bc8114bc9d084d55fb84db7d50c9e32493396bb83a050d9f218614b67e258315065088ce7237304a78153270027ac88ea49931907634805c"}, 0x1cf) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) 03:33:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8200, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000017bfe68020000000000000000d3739e64000008"], 0x4c) 03:33:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000001c0)) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:35 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 03:33:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449", 0x54, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:35 executing program 5: io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) 03:33:35 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000001480)='\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(r1, 0x5402, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040), &(0x7f00000001c0)=0x4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) listen(r1, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000340)=""/4096, &(0x7f0000000240)=0x1000) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r4, 0x2, 0x1) pwritev(r2, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) setsockopt$packet_int(r5, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000001380)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x34, r6, 0x220, 0x70bd24, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xa, 0x6, @l2={'eth', 0x3a, 'erspan0\x00'}}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000c1}, 0x4010) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000200)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) fstat(r1, &(0x7f0000000280)) sendto$unix(r5, 0x0, 0x2f5, 0x20000000, 0x0, 0x13b) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:35 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 03:33:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4", 0x62, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) unlink(&(0x7f0000000080)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:33:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80000) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x944041, &(0x7f0000000040)=ANY=[]) write$P9_RSTATFS(r0, &(0x7f0000001500)={0x43, 0x9, 0x4, {0x6, 0x2, 0x5, 0x2, 0x4, 0x0, 0x0, 0x1, 0x1}}, 0x43) r1 = getegid() getresuid(&(0x7f0000000100), &(0x7f0000001380)=0x0, &(0x7f00000013c0)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='.\x00', 0x4, 0x3, &(0x7f0000001300)=[{&(0x7f0000000200)="0d26f13a55cf6d1c1adbf910dd84a2d5f26146c39db1195329298330f37c8212efaf4d364f92a5b757d91ef2cf173e78be047bd90380c8e992427a94bddb33dd6789fded2775ab5b2ab4d4b3653467901d7946f31737d50a66ce", 0x5a, 0x7fffffff}, {&(0x7f0000000280)="44fc0f3a18c1a1b90ae67c0179d4cbffddbc106db8f7bc6aecdbbdd75f4135bfabac3f465119ffa7e680a388f85aa6eca545908dc8d65ecd9386301809657865891cdcda7021049ba6cc6e0e0b6d2cec9f1e4f6159cc1a7243ed7097924b46c93d", 0x61, 0x7}, {&(0x7f0000000300)="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", 0x1000, 0x7}], 0x80, &(0x7f0000001400)={[{@nombcache='nombcache'}, {@journal_checksum='journal_checksum'}, {@sb={'sb', 0x3d, 0x101}}, {@resgid={'resgid', 0x3d, r1}}], [{@dont_measure='dont_measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x79, 0x37, 0x0, 0x34, 0x3b, 0x36, 0x30, 0x37], 0x2d, [0x38, 0x77, 0x72, 0x33], 0x2d, [0x75, 0x64, 0x36, 0x31], 0x2d, [0x7f, 0x64, 0x77, 0x36], 0x2d, [0x73, 0x33, 0x77, 0x64, 0x7b, 0x0, 0x3a, 0x7a]}}}, {@subj_role={'subj_role', 0x3d, 'trusted'}}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@hash='hash'}]}) 03:33:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c, 0x80000) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) 03:33:36 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) 03:33:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd46776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4", 0x62, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) rt_sigtimedwait(&(0x7f0000000040)={0x7}, &(0x7f0000000180), &(0x7f0000000100), 0x8) 03:33:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x111000, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x2) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) [ 421.134345] sel_write_load: 22 callbacks suppressed [ 421.134350] SELinux: failed to load policy 03:33:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0acb5f05") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ptrace$setregset(0x4205, r1, 0x206, &(0x7f0000000240)={&(0x7f00000000c0)="13522dc77b8802c0831647d47313ca1f8fa7c153ed0010a0ab0d9389d404daddae6ac2281d5120db8f33fcae12eec5ad4a34cf51bda90abd9a1491520fdfb91035543deb944c3e3581fe693946ac47ed7f1bd0f3d73db8361e7a0e01bace1436d53f62390268e9305758648ff03e6c5c7568452418ab165198aa92d37d7266f3d24192654fa66ba763760159573c2f9c5a7463488548459fb728115e3285337fb51e35dba4e171ef05c1e0c5811187ba9aaa54ec58f1da", 0x221}) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e755b159c00000000000000402c00000000000009004007000000000d0000004000d70f22f1eeb6f79f00000000000000d3739e6400000052528c53417cc038078d11b6a21b403562cbeb8b8fde35eaa477bfa3babc6a7245781503999737dff1c5eefbecf6485fcb81d4d1891f23c9621add8b67a354abed2efb48ac2c8a197e9f6fa71c2ca6780f8a86d441a93f4ae1483fa952988fedcc5a44d3f93e2209477506ebd4e9d103e0d547b8ebaf143639219ed6e6f683c984ab000000"], 0x4c) [ 421.342563] SELinux: failed to load policy 03:33:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4", 0x62, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(r0, &(0x7f0000000280)="f50805f9e06ff933cd61ddbdf1e3714d29f349fc363c85f62ee103ba15abdc8b20faf9d21a763d034cb7ffec812ae6fcbc1f439ce5f60ac646a0097ef5217603af5c606f798328a5a79705f6e71d76f88d2fcca0975cbf04cea6e53e3543a8", 0x5f, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 03:33:36 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x1000000e8) fcntl$setstatus(r0, 0x4, 0x46c00) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef555}]) [ 421.547319] EXT4-fs: 7 callbacks suppressed [ 421.547327] EXT4-fs (sda1): Cannot specify journal on remount [ 421.586039] SELinux: policydb string SE Linu[ does not match my string SE Linux 03:33:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="0adc1f123c12063166b0702b032fb9fb45dbf1085e2cafc9a98bfad38f757a655ee3b9570e8ac7833dc035971f559129f1c90c1f2d4f4bf4019993d55a1af4b9deab20945feaf46429c1c87520e7ab708029908a2847aa0d0725cff2af2ff8235a5ac4e797a869bca914cd30a11ca01a270a5718e7bda6a49f534f4b1f5e595f9addab5e0ee01c01cfc445254c1a0b41d337dad304db5b7f5f4b792b0a5f38c57f8280a65604195960539c0e0fbb3255581204132fb7e7c45eb2b109c8f4ebbffb4be17c5bd7e516ffdd400ae00800") fdatasync(r0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781508000000f600000800000007000000402c00000000000009000007000000000d00000000000000077bfe68020000000000000000d3739e64000000"], 0x4c) socket$inet_udplite(0x2, 0x2, 0x88) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1010}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)={0x210, 0x4, 0x8, 0xc00, 0x70bd26, 0x25dfdbfe, {0xf, 0x0, 0x1}, [@nested={0x18, 0x22, [@typed={0x8, 0x96, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x4, 0x37}, @typed={0x8, 0x8f, @u32=0x401}]}, @typed={0xc, 0x11, @u64=0x7}, @nested={0xb4, 0x60, [@typed={0xc, 0x10, @u64=0x101}, @typed={0x4, 0x5c}, @generic="8b1917c94e1ea34f789f05b5eb331fc7ccb64ee5f608e062f71d9648ac55dfafb4b20edee97cc9adba6929712acfbfa48b1afe3c2c4676d6b8b3338f386d633334782cc39a975cf25a3e85cbd0d2d0f53b781051e1eb21b8aec8e89fa27e4e495d641532c256f996d477a3bdc9255301665203c48eb0b5f91f92008f895bce46be34555ee832c1e1e9703c46b2a2ca884f69c0ca03c627e830c91dc912"]}, @typed={0x14, 0x6b, @ipv6=@remote}, @typed={0x8, 0x67, @uid=r2}, @nested={0x108, 0x7a, [@typed={0x8, 0xf, @fd=r1}, @typed={0x8, 0x1, @u32=0x2}, @generic="86401f63165310d0740ed78f8d870aeed08eeeff870ff1c89be1f7635adad0d4d3bfc9e5149ba38c6311366c7852e49fa71eb672d7bd6ded72f39b97fe5f148511ca25da966ae6c6cc25884438a1897f8cba83b88d695e49c842d8c4c86137aa513f4ae21e17968d9a13e5c76e65e491806847632f1388f84a0dfb2333718bcc1db172974ff568e1c861c28fd1e9d36403040f8f2108e1f171f2172a88cb0574335a2761d50af0842029835c32de05ef35029e8890c9b19217f97b06e56f41bf0c40b765287c1573bd0521bb85a595926adaf9fa524a52c29981b4312abab87433d7bcc42eb8b8e30d5c83888e", @typed={0x4, 0x6f}]}, @generic]}, 0x210}, 0x1, 0x0, 0x0, 0x800}, 0x0) [ 421.610332] SELinux: failed to load policy [ 421.680652] kasan: CONFIG_KASAN_INLINE enabled [ 421.685334] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 421.693033] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 421.699785] Modules linked in: [ 421.702970] CPU: 0 PID: 14615 Comm: blkid Not tainted 4.14.96+ #19 [ 421.709263] task: ffff8881a4dede00 task.stack: ffff8881d3f18000 [ 421.715301] RIP: 0010:kobject_uevent_env+0x62/0xc60 [ 421.720293] RSP: 0018:ffff8881d3f1fc10 EFLAGS: 00010206 [ 421.725633] RAX: 0000000000000018 RBX: 0000000000000002 RCX: 1ffff110349bdcc4 [ 421.732880] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000000000c0 [ 421.740128] RBP: ffff8881d16c0f50 R08: 0000000000000001 R09: 0000000000000002 [ 421.747373] R10: ffff8881a4dee680 R11: 0000000000000001 R12: 00000000000000a0 [ 421.754618] R13: dffffc0000000000 R14: ffff8881d16c0ec8 R15: 00000000000000a0 [ 421.761867] FS: 00007f5430b4d740(0000) GS:ffff8881db800000(0000) knlGS:0000000000000000 [ 421.770071] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 421.775937] CR2: 000000c42c779000 CR3: 00000001a14e2006 CR4: 00000000001606b0 [ 421.783196] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 421.790595] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 421.797846] Call Trace: [ 421.800421] loop_clr_fd+0x49e/0xac0 [ 421.804127] ? lo_compat_ioctl+0x130/0x130 [ 421.808349] lo_release+0xdd/0x170 [ 421.811878] ? lo_compat_ioctl+0x130/0x130 [ 421.816091] __blkdev_put+0x518/0x6d0 [ 421.819870] ? bd_set_size+0xb0/0xb0 [ 421.823568] ? blkdev_put+0x75/0x4c0 [ 421.827257] ? blkdev_put+0x4c0/0x4c0 [ 421.831033] blkdev_close+0x86/0xb0 [ 421.834647] __fput+0x25e/0x700 [ 421.837926] task_work_run+0x118/0x190 [ 421.841806] exit_to_usermode_loop+0x13b/0x160 [ 421.846363] do_syscall_64+0x372/0x4b0 [ 421.850230] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 421.855567] Code: 03 42 80 3c 28 00 0f 85 7c 0a 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 4f 02 00 00 e8 0a 9f af fe 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 48 0a 00 00 49 8b 6c 24 20 48 85 ed 74 b0 [ 421.874631] RIP: kobject_uevent_env+0x62/0xc60 RSP: ffff8881d3f1fc10 [ 421.881348] ---[ end trace cf31483bed52d8f3 ]--- [ 421.886125] Kernel panic - not syncing: Fatal exception [ 421.891830] Kernel Offset: 0xae00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 421.902642] Rebooting in 86400 seconds..