00000007c0)=""/36) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r5, 0xff, 0x1, &(0x7f0000000040), 0x2f1) openat$uhid(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/uhid\x00', 0x802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00003a3000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f000051d000/0x4000)=nil, 0x4000, 0x4) inotify_init() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 03:33:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0xb}}) clock_getres(0x5, &(0x7f0000000240)) r2 = signalfd4(r0, &(0x7f0000000000)={0x6}, 0x8, 0x80800) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x301140, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f0000000200)={0x0, 0x0, 0x6e, 0x1}) ppoll(&(0x7f0000000040)=[{r1, 0x4}, {r2, 0x4002}], 0x2, &(0x7f0000000100)={r3, r4+10000000}, &(0x7f0000000140)={0xfff}, 0x8) 03:33:46 executing program 5: capset(&(0x7f0000000100)={0x400019980330}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f00000000c0)=0xfffffffffffffffd) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), 0x4) [ 385.175656] netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:46 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000008041200, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x45}, 0x28, 0x3) 03:33:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x40, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0x16fd}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000180)={{0x0, @local, 0x4e22, 0x1, 'lblc\x00', 0x8, 0x8, 0xe}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x4e21, 0x10003, 0xd1, 0x6, 0x80000000}}, 0x44) [ 385.241130] audit: type=1401 audit(2000000026.310:103): op=setxattr invalid_context="" 03:33:46 executing program 4: socket$inet6(0xa, 0x3, 0x1) epoll_create1(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)=@sg0='/dev/sg0\x00', &(0x7f00000008c0)='./file1\x00', &(0x7f0000000180)='mslos\x00', 0x800000000, &(0x7f00000004c0)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000900)={{0x2, 0x4e20, @local}, {0x306}, 0xc, {0x2, 0x4e24, @local}, 'nr0\x00'}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000340)='ns/user\x00') setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x40, 0x921b527a62bfdc30) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a066104010000000000000200000000000040000000000000000c02000000000000a6d10000030038000200ffffffff468051e57464030000000300000000000000bc08000000000000f9ffffffffffffffff7f0000000000000600000000000000000800000000000005000000020000006f000000000000000000000000000000ea2b000000000000080000000000000003000000000000000800000000000000f8d1cf6bc8252c025b5f92a84bb4d5efd7201c0b3858f146eeae2dc7f0e87b4cb7c2ebe8e1bf26d90204e8796ae2234ab4507f89e0a927c56e06ac8486242f23306477b3ced713f3ccd7a0f1572c2cfeceaf21bfb67974157e7a4e10510b1d74ca0f796a92f62c8102c33ef139e0cf2ccd4388e8404194afc7dcb3c0580904a76736e493f5c3e2c8d91d510485793916f26e041f6b30857e8c9b55fe64259328116a71513c065b05319d42f98f000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000008f0000000000000000000000000000000000000000000000000000000000000000000000000000001e00000000000000000000000000000000000000a5839c32f12bef5ebd0000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d75c6ef81318e500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff00000000000000000000000000000000000000000000000000db0000000000000000000000000000000000000000bb4243dbcbc2188b0017487b2e533a58643fe24b175f8e919e52849e39389043525d3ddd"], 0x3dd) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYBLOB="7f454c4600250000050000000000000003003e00060000002c010000000000004000000000000000e1000000000000000500000087003800020002000700ea000200007001000000ea0a000000000000f7ffffffffffffff00000000ffffffff00000000000000000100000001000400010000000000000001000070040000000500000000000000000000000000000005000000000000000100000001000000ff0f00000000000000fcfffffffffffff423273d395b5dfe49a633eb0eb0263328129db30c89d614ca312379424593d1149401363a977a2b10bc8394762bab422771360aa38dc889b26829f721e3098b0f80c2f4ee55bcf0df04911af0a6a16e0ab5b5bb1e2227df0cb7b403be567ea3b9adef738dd4b7efbd9e56dfc0dc488a064d4ad246d477bc8fedb6c1fbcd09469e544a6ac9afa9987b94c8d1209a41a79416931a8f43bd761418a2c47221a2a4d6bee2592cd6eab8fa3ac582965b48d68fb1dde708c9901874b0f1628c0adf0dc15872d102a327edf073a52942892de4cc87c25e76cde841dd1e09db3f59955450018b682981af9bf3133a11fbf7915b41105bd663e6f7116777b3cb43f260d25a06d22119ca7674f7d9eeb496cccae5ea73758600072b6f0c2a040000002001cb0000fbc132be60c8b0bf6ac0a892b355685d62cb7077a1e889c359d7bfc544111c6ca232e6c6593a0b8f085567b065536d649fea6d4e202255fc1a0dedba780af208b0457ed33958cfd97c0155f59b06d997423bb3b6f3d5e01c8b74030434cacb0e508ef261aff03a72021b6011f6ff05f6070f0bcb7d75cbf1668562cd6599dcf1eac792c47370ac83b2730215d9955f6fa81f59d3209fbaf52f41f8c413432d976fe6eb3ae98661de6250e09bcf7b82d0492b349ca022abe346a443d41aa83ba7d2ed5193dda7e9c78769b1430e5a171e12e0fa1d057e1aef4b856ab0f2dabc8b207f09d78e1f83461ccac0b2558732ea70d369973971d2c6d94081f33308b1e4b27a2ce6f45838809407045aa63b07372728d2aabbb752eb506219d82564c7323f73bfc2260fd95e5e8eeca550b29adcca477de69469764858d7aa3ab8afd99e883c43dacae12ac88e7fea5a99df90755e5caf59185794ed6419a22fe36d9070ed6558b090cb871914491e2a135047b729107896b784bf87c941f7b993033898b993c83b8bcec93aed20e900921e8c8e65939b23a0f84c837a71633aad5664665e7f89839258d1477a2e8fceaa9280b9c9dc53b5ed4bd907c3948f04ac1eff961bf3040ae0faed3985bccc355506dfcd52907750828fc988e60aec5b577af9769cebc8d6e87a826826f8362c84fe7ec9e6d3cc39c1b6b6b9005eaaf0d9037fa576757018d3f60fbab576284cd734f48b0e4b3e70a4b8143dc67e94c1090b7376eec330f5995c4b3a119646b4a953cf0669d6e52264827bbbae2c7565529a68f46f5e1a23137059867d0192caf6b22e2d74f8fbe12a139bc90a0d12b6acc0a106ba4fc2baf87c254bb54083ffffff7f63dbc82581cec688136c617847b1a3b6c0c331af00086cae971610587c4683d5f1b0dd68b8a419f581f0387cc9d1a435e329a0595d73a4489b1ea23c331ca752bfd46de13f0ee26e7e2e9b11dd7151883ac8112c0ba049070bcf00881cc0a37395f1a102cddda4b0b903b0233461e70254e6a75b9c29c02fce51b630d5cd58867e5f8e5b47fdb2fb53e0b9485f1079ddb39d7b3ef5d8d37be9a08714575e454274581a8ad758ba53da32d2c893e8a40de0febf31f84016558a9db7c53dec27895d69fa1a34e4b5b856f4d0974a9dd4031e28632a245b921a576f1a19f47d7ba08e9ca94a7ae46c89b379d90e0dfdcffb790586d920ea79f94af735aa51695dfe0c9c73a44b277e877b473b43f5c3a960d7c5e22678ab3f7cf46bdf23cbbd31df613827f8e23f7b2c71be25eab7dbd56f7b426b78f8e5afe72366ffcd05c29b92ad591e35a19df805a2b89b9b87a13109c19ea941e9b9f6ee1c47708870abfda2debce7eae0f356bc896a5a207f6bc3ed4186117e1ae9b861d3a9a94520a6df99fd700c6fc3b82467a1257c2040dd34b2fb30c032224e6b864900f93168e387edaeeedaebf8b7b40d4caaa97c85229e63770ced3382013fd11010d0ee46333666aaec98aacc511c92be9e55eee400c74ab4614552624ad88f5d63b6f87e85826ee7cf6f15418f9712c6d07f36a54f097d9bc48b3035ae569af4753e7831dc520fe4726d0c96d0cb7b45e5ca5002884d38ed8e8ead8d4a7da76f9bcfd848fd27345bec7dd4356ef7b11a0cd3113bd9c581e7e647eddd060553fd6e9194bc07ffc5ca9eb6e9ce36aa545ac0f6e242e381282522481668f05909a69db9c8f417ce2406fb727c11fa8ed3ec6f097fed51414f3286075c414753979f58a70d97539c1215ad15f4f24e9921c3fc4636f4fb616d5b871cbdc9cb27e00245bb2291f767d4c581387a63022c727026043c0180a848edd1c3fffff21c3fe0b11c65caca8941959536882277e3dc9e61da52527a24e2d79a367a80b33b24f1ca184d56ad13194867d7a0a424977b5f256a4643460a03007ccf2abb042c6a8f357ee967298f4ee68fa10d82aeec9c63884f43927692db04bfa6651a630ff1e945d5c2ceb1552d0cd69830f257e5d2b500e4447f03edc78938d82871b7075be875dee546cd23ae617356f51fe8f1fb11417e63a436d7ca0ecd22fab3719ab5b4a4fa0ac2b6a44002fdddb61f7d6fe2beac291455b144cff1da4cb487c430a42cd6dee2b0752536175bdeb3abf2a393823dddf4567d7a6ac785662eb272ea9ea223e0d63a2d027fc3bfa6da9c1537a5c207c9f2495bd45ee28be938ad3dbdadee778875ba641ceb20f3fb23d57269a4e40e0baea56d0b4247f12ebb7cf6ee0e64b0d521c8636ca845287f752adfde004e37bee0451540bcabf455b43233e287e4ce36ebbf2cf0aa8325b72b90c40cc5bdf77f66b07bf5423a80409e1e95424e2d63c09e621354d87d29d28758c290f29746e00e72e1f6ee9fc93841a7a4ec7420c1d78c09f9355b41c5b6a2e94d0a218428a4e4e40bcab84f0cdc9a230101146a11e1f36367b4b5f21e76b5e58c31aec27a47e7ce6c22d29c553f03d0515199b541750e92718c53542cb8c0e4202c89b5bc2a4e3cd4fd1e33ba846b2d2d1c94d2e73327b1d327fe80ff1113634e2e94769b97a1088c2f00001fd26ffbf3b4b82036e960a01efd1eecb0e4cff79c5943cb7f3390757f2ebaa20ac131cddf19065dad03237cca7406b5c30228494fe25d9d26631795f3b0a17ac6c8c27e37a75bce127c592beed29fe6137efe5ac28a2a89597db794c570055e318e92f17f36e3fcbc68c8233d2f0c433f9e11b2819ade8026682c9c966d13605ba9cfa66d91f8203260ed06d8c53912b2c25be01165ebda24e3b70c4fa4a99c56470ee400000092272d6ba4a0906d5b8df7039b82bf83378b78ce124aca8b7944fffdd65bfca51e33614282fb1738dd43c6b95f2bc5e9b24605ff3fb5a06ece40c2c4a86b93acdde534777d1ac562abddbdcce0d91247c5196e7ef7d65ff45606324b402aa6b81afa463f63f96bc442cd25a033b7b6feed08de0f00bccb16c439813c6c4b1d1733bb55a6245a9180ec71a7f31631613c60af161f5ef64493b859a6c4baa9e3811250984db538169178a4f4cb4141f74e366a28b4fdeef59bb22f6f525c493912a044bd99a3b4b86b2834a40437d58d4292a22a730b6a2e5ec7bf358c2016326fff4889d5d5e1beec898a3888d0f4a450d86548a1a9b1cc1bee45e6a4e2c4e0bcd69a51d46190755bd42c1e53d4a1f80010da651d6c500a066afa9c98755acf643ff381af66742c6e091746c77e0f14f2583d6d70339ed50e9da34a0aa8820359872132179f087f16cdaf3636688927e39a857a99f911d08406b6addefa9f895f3b29812234eaf4d5a93b9363fa02a4ee9fe8676811004fabc8121f7639e9f92c0d7f796a6355e984d7a85aadc638b3b17d74fa96eb571516eb1a9fc487e918956411823e1edef555a61ba7d45931457b221bdcc8aaad58e8007497a8846278e0aed68926d3ea9fd96a89ccc89627c86da315c3eb5445bf799df613befe958390660f6c9f7ac02e3187100f18eb3bfacf9662601fc9868329b3524cb8c07850726355bd748f7c51b32e6c4341676cef6af55351e599d196d38d63bf0cd20b85f4bc79a2895b9c5c4d46090b4e1a10394f8ba7201d45d3878dc9b3e7ec3510073424b92a7448f9d8d9c15fff2a1c0e6dde7e6ad83f6243b21c6c14bd1b36e834b9cdc2b09022c0ddad8b5cdedb4ade2e81d79456e11360da181cfce8588814cfefa8bda9ccea60f525df9503"], 0xc25) 03:33:47 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:47 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in=@multicast2}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@dev}}, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000040)=0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 03:33:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000080)="0faef24029450ff3440f1157f19143a1a00f9e0000000000ff9a1d00000054aa400f34c30fb11d00398041c4437d059d57000000002b610dc29004f34c0f38f6a30a00000000008fcd78a30000d45ec31e0ff7c6") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x200, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc040}, 0x20000080) unlink(&(0x7f0000000240)='./file0\x00') 03:33:47 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x101050, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x2, 0x801, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1, 0x0, &(0x7f0000000080)) 03:33:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0xfffffffffffffc96, &(0x7f0000000040)=""/125, 0x7d}, 0x6}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x800, 0x97) ioctl$KDSETLED(r0, 0x4b32, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'vxcan1\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) preadv(r0, &(0x7f00000017c0), 0x3ba, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7) getdents64(r0, &(0x7f0000000140)=""/147, 0x93) [ 385.958042] audit: type=1400 audit(2000000027.020:104): avc: denied { map } for pid=18830 comm="syz-executor0" path="socket:[43959]" dev="sockfs" ino=43959 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:33:49 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3be) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000300)=0x1, 0x4) r3 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1b) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) ptrace$getenv(0x4201, r3, 0x0, &(0x7f0000000280)) getresgid(&(0x7f0000000180), &(0x7f0000000340)=0x0, &(0x7f0000000200)) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={r4, r5, r6}, 0xc) ptrace$cont(0x1f, r3, 0x0, 0x0) wait4(r3, 0x0, 0x1000008, &(0x7f0000000400)) 03:33:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0xe8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) write$evdev(r0, &(0x7f0000000180)=[{{}, 0x11, 0x8}], 0xff6f) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0xc, 0xea, 0x7fffffff}) 03:33:49 executing program 4: socket$inet6(0xa, 0x3, 0x1) epoll_create1(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)=@sg0='/dev/sg0\x00', &(0x7f00000008c0)='./file1\x00', &(0x7f0000000180)='mslos\x00', 0x800000000, &(0x7f00000004c0)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000900)={{0x2, 0x4e20, @local}, {0x306}, 0xc, {0x2, 0x4e24, @local}, 'nr0\x00'}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000340)='ns/user\x00') setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x40, 0x921b527a62bfdc30) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a066104010000000000000200000000000040000000000000000c02000000000000a6d10000030038000200ffffffff468051e57464030000000300000000000000bc08000000000000f9ffffffffffffffff7f0000000000000600000000000000000800000000000005000000020000006f000000000000000000000000000000ea2b000000000000080000000000000003000000000000000800000000000000f8d1cf6bc8252c025b5f92a84bb4d5efd7201c0b3858f146eeae2dc7f0e87b4cb7c2ebe8e1bf26d90204e8796ae2234ab4507f89e0a927c56e06ac8486242f23306477b3ced713f3ccd7a0f1572c2cfeceaf21bfb67974157e7a4e10510b1d74ca0f796a92f62c8102c33ef139e0cf2ccd4388e8404194afc7dcb3c0580904a76736e493f5c3e2c8d91d510485793916f26e041f6b30857e8c9b55fe64259328116a71513c065b05319d42f98f000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000008f0000000000000000000000000000000000000000000000000000000000000000000000000000001e00000000000000000000000000000000000000a5839c32f12bef5ebd0000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d75c6ef81318e500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff00000000000000000000000000000000000000000000000000db0000000000000000000000000000000000000000bb4243dbcbc2188b0017487b2e533a58643fe24b175f8e919e52849e39389043525d3ddd"], 0x3dd) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYBLOB="7f454c4600250000050000000000000003003e00060000002c010000000000004000000000000000e1000000000000000500000087003800020002000700ea000200007001000000ea0a000000000000f7ffffffffffffff00000000ffffffff00000000000000000100000001000400010000000000000001000070040000000500000000000000000000000000000005000000000000000100000001000000ff0f00000000000000fcfffffffffffff423273d395b5dfe49a633eb0eb0263328129db30c89d614ca312379424593d1149401363a977a2b10bc8394762bab422771360aa38dc889b26829f721e3098b0f80c2f4ee55bcf0df04911af0a6a16e0ab5b5bb1e2227df0cb7b403be567ea3b9adef738dd4b7efbd9e56dfc0dc488a064d4ad246d477bc8fedb6c1fbcd09469e544a6ac9afa9987b94c8d1209a41a79416931a8f43bd761418a2c47221a2a4d6bee2592cd6eab8fa3ac582965b48d68fb1dde708c9901874b0f1628c0adf0dc15872d102a327edf073a52942892de4cc87c25e76cde841dd1e09db3f59955450018b682981af9bf3133a11fbf7915b41105bd663e6f7116777b3cb43f260d25a06d22119ca7674f7d9eeb496cccae5ea73758600072b6f0c2a040000002001cb0000fbc132be60c8b0bf6ac0a892b355685d62cb7077a1e889c359d7bfc544111c6ca232e6c6593a0b8f085567b065536d649fea6d4e202255fc1a0dedba780af208b0457ed33958cfd97c0155f59b06d997423bb3b6f3d5e01c8b74030434cacb0e508ef261aff03a72021b6011f6ff05f6070f0bcb7d75cbf1668562cd6599dcf1eac792c47370ac83b2730215d9955f6fa81f59d3209fbaf52f41f8c413432d976fe6eb3ae98661de6250e09bcf7b82d0492b349ca022abe346a443d41aa83ba7d2ed5193dda7e9c78769b1430e5a171e12e0fa1d057e1aef4b856ab0f2dabc8b207f09d78e1f83461ccac0b2558732ea70d369973971d2c6d94081f33308b1e4b27a2ce6f45838809407045aa63b07372728d2aabbb752eb506219d82564c7323f73bfc2260fd95e5e8eeca550b29adcca477de69469764858d7aa3ab8afd99e883c43dacae12ac88e7fea5a99df90755e5caf59185794ed6419a22fe36d9070ed6558b090cb871914491e2a135047b729107896b784bf87c941f7b993033898b993c83b8bcec93aed20e900921e8c8e65939b23a0f84c837a71633aad5664665e7f89839258d1477a2e8fceaa9280b9c9dc53b5ed4bd907c3948f04ac1eff961bf3040ae0faed3985bccc355506dfcd52907750828fc988e60aec5b577af9769cebc8d6e87a826826f8362c84fe7ec9e6d3cc39c1b6b6b9005eaaf0d9037fa576757018d3f60fbab576284cd734f48b0e4b3e70a4b8143dc67e94c1090b7376eec330f5995c4b3a119646b4a953cf0669d6e52264827bbbae2c7565529a68f46f5e1a23137059867d0192caf6b22e2d74f8fbe12a139bc90a0d12b6acc0a106ba4fc2baf87c254bb54083ffffff7f63dbc82581cec688136c617847b1a3b6c0c331af00086cae971610587c4683d5f1b0dd68b8a419f581f0387cc9d1a435e329a0595d73a4489b1ea23c331ca752bfd46de13f0ee26e7e2e9b11dd7151883ac8112c0ba049070bcf00881cc0a37395f1a102cddda4b0b903b0233461e70254e6a75b9c29c02fce51b630d5cd58867e5f8e5b47fdb2fb53e0b9485f1079ddb39d7b3ef5d8d37be9a08714575e454274581a8ad758ba53da32d2c893e8a40de0febf31f84016558a9db7c53dec27895d69fa1a34e4b5b856f4d0974a9dd4031e28632a245b921a576f1a19f47d7ba08e9ca94a7ae46c89b379d90e0dfdcffb790586d920ea79f94af735aa51695dfe0c9c73a44b277e877b473b43f5c3a960d7c5e22678ab3f7cf46bdf23cbbd31df613827f8e23f7b2c71be25eab7dbd56f7b426b78f8e5afe72366ffcd05c29b92ad591e35a19df805a2b89b9b87a13109c19ea941e9b9f6ee1c47708870abfda2debce7eae0f356bc896a5a207f6bc3ed4186117e1ae9b861d3a9a94520a6df99fd700c6fc3b82467a1257c2040dd34b2fb30c032224e6b864900f93168e387edaeeedaebf8b7b40d4caaa97c85229e63770ced3382013fd11010d0ee46333666aaec98aacc511c92be9e55eee400c74ab4614552624ad88f5d63b6f87e85826ee7cf6f15418f9712c6d07f36a54f097d9bc48b3035ae569af4753e7831dc520fe4726d0c96d0cb7b45e5ca5002884d38ed8e8ead8d4a7da76f9bcfd848fd27345bec7dd4356ef7b11a0cd3113bd9c581e7e647eddd060553fd6e9194bc07ffc5ca9eb6e9ce36aa545ac0f6e242e381282522481668f05909a69db9c8f417ce2406fb727c11fa8ed3ec6f097fed51414f3286075c414753979f58a70d97539c1215ad15f4f24e9921c3fc4636f4fb616d5b871cbdc9cb27e00245bb2291f767d4c581387a63022c727026043c0180a848edd1c3fffff21c3fe0b11c65caca8941959536882277e3dc9e61da52527a24e2d79a367a80b33b24f1ca184d56ad13194867d7a0a424977b5f256a4643460a03007ccf2abb042c6a8f357ee967298f4ee68fa10d82aeec9c63884f43927692db04bfa6651a630ff1e945d5c2ceb1552d0cd69830f257e5d2b500e4447f03edc78938d82871b7075be875dee546cd23ae617356f51fe8f1fb11417e63a436d7ca0ecd22fab3719ab5b4a4fa0ac2b6a44002fdddb61f7d6fe2beac291455b144cff1da4cb487c430a42cd6dee2b0752536175bdeb3abf2a393823dddf4567d7a6ac785662eb272ea9ea223e0d63a2d027fc3bfa6da9c1537a5c207c9f2495bd45ee28be938ad3dbdadee778875ba641ceb20f3fb23d57269a4e40e0baea56d0b4247f12ebb7cf6ee0e64b0d521c8636ca845287f752adfde004e37bee0451540bcabf455b43233e287e4ce36ebbf2cf0aa8325b72b90c40cc5bdf77f66b07bf5423a80409e1e95424e2d63c09e621354d87d29d28758c290f29746e00e72e1f6ee9fc93841a7a4ec7420c1d78c09f9355b41c5b6a2e94d0a218428a4e4e40bcab84f0cdc9a230101146a11e1f36367b4b5f21e76b5e58c31aec27a47e7ce6c22d29c553f03d0515199b541750e92718c53542cb8c0e4202c89b5bc2a4e3cd4fd1e33ba846b2d2d1c94d2e73327b1d327fe80ff1113634e2e94769b97a1088c2f00001fd26ffbf3b4b82036e960a01efd1eecb0e4cff79c5943cb7f3390757f2ebaa20ac131cddf19065dad03237cca7406b5c30228494fe25d9d26631795f3b0a17ac6c8c27e37a75bce127c592beed29fe6137efe5ac28a2a89597db794c570055e318e92f17f36e3fcbc68c8233d2f0c433f9e11b2819ade8026682c9c966d13605ba9cfa66d91f8203260ed06d8c53912b2c25be01165ebda24e3b70c4fa4a99c56470ee400000092272d6ba4a0906d5b8df7039b82bf83378b78ce124aca8b7944fffdd65bfca51e33614282fb1738dd43c6b95f2bc5e9b24605ff3fb5a06ece40c2c4a86b93acdde534777d1ac562abddbdcce0d91247c5196e7ef7d65ff45606324b402aa6b81afa463f63f96bc442cd25a033b7b6feed08de0f00bccb16c439813c6c4b1d1733bb55a6245a9180ec71a7f31631613c60af161f5ef64493b859a6c4baa9e3811250984db538169178a4f4cb4141f74e366a28b4fdeef59bb22f6f525c493912a044bd99a3b4b86b2834a40437d58d4292a22a730b6a2e5ec7bf358c2016326fff4889d5d5e1beec898a3888d0f4a450d86548a1a9b1cc1bee45e6a4e2c4e0bcd69a51d46190755bd42c1e53d4a1f80010da651d6c500a066afa9c98755acf643ff381af66742c6e091746c77e0f14f2583d6d70339ed50e9da34a0aa8820359872132179f087f16cdaf3636688927e39a857a99f911d08406b6addefa9f895f3b29812234eaf4d5a93b9363fa02a4ee9fe8676811004fabc8121f7639e9f92c0d7f796a6355e984d7a85aadc638b3b17d74fa96eb571516eb1a9fc487e918956411823e1edef555a61ba7d45931457b221bdcc8aaad58e8007497a8846278e0aed68926d3ea9fd96a89ccc89627c86da315c3eb5445bf799df613befe958390660f6c9f7ac02e3187100f18eb3bfacf9662601fc9868329b3524cb8c07850726355bd748f7c51b32e6c4341676cef6af55351e599d196d38d63bf0cd20b85f4bc79a2895b9c5c4d46090b4e1a10394f8ba7201d45d3878dc9b3e7ec3510073424b92a7448f9d8d9c15fff2a1c0e6dde7e6ad83f6243b21c6c14bd1b36e834b9cdc2b09022c0ddad8b5cdedb4ade2e81d79456e11360da181cfce8588814cfefa8bda9ccea60f525df9503"], 0xc25) 03:33:49 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff}) r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) inotify_init() getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x20, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000280)="83eeaceb1b7401c4f9f39bb6504dfb9b68f8d8c035ce3bc2e8e9d61b1c2e7de5dfb54a4a2338d757c08f31882bd5ca5758bb2337dfbd799bc63ee2b129729c7381c8131e09c46afa568699bf58c0c0a8a703d5e6ba6caaed201e78196336ee635253538179709a26221bd380ef14e569a1b5ca8d955342abf1d4a1c6062440c9bc606f124f3ffea07bcb3b54e065b4dddaed02f0fd18ffa3b4861affb89f474c966f281e86d231aae5f021e7e5e3f424027987c8141c831cac2d6d0ae7b685d7ecb11b960fa7", 0xc6, 0x8}, {&(0x7f0000000380)="e85de1b90cf5815b3f41547a0966eb9916b79f191a3de9c87f0689f3a9e1d2c10681a76f9b95557c02bd5a218c4c9fa7569c4c9ad727cf18e69e1182a51e251da2798c5e0721005a359597f8152931e152e93fa3fdabe18d1ca9411ee2291b7723801e7759ab9d09d5db27d8322bdc3d52c36c85d9a260b49bfd01932bdc9f427c43f3d0b94f", 0x86}, {&(0x7f0000000440)="8d738815e951dc341b873c223428ad860f40f6d9da593c36380892422ed7fae4e74743e8ff5da5121e2b0caba577a83f2195d358419fcba397272d9b2ec62621bf2e05685a0f902ec638f172f3adad93536c3d2477", 0x55, 0x52eb}, {&(0x7f0000000180)="c19e503daf0a41556d81baf07e9a2d62740b6d8d27b76f1fa794c74ab1769c95", 0x20, 0x8}, {&(0x7f00000004c0)="33f9e0b2c660bb4cf18e896dd82a8c345bcd2b5f5cf92d2d550afe076ae98972f04b3e15f7c909ef26165d0b6672af89746d9ecad299fcf0c2e5a801df77f7685e310feab720253ec69cf6c60c56c766d43ec1fce26a0bb7937d00d3617d2f1afbef5f84b3e3ab9e4c585445bf96fec4e4305ee7a9231f67c39aa5adba42c7e17ca46b2944c07a7cbc0bddc083b0524ab5f4505577e41c1283a12b6f74beb90e87815c406999ef662c6d121c0d3f5818c84afde886476bb68bf14a076fccc368dec1a0eb9896844dc0e118eec6100212661580a59c6013cc26acb6a22c88ca56f38a073ae6c3c03c77a0b1b336a750bf0be303d4fc9c706ecf", 0xf9, 0x5}, {&(0x7f0000000200)="de31f7d4c5eb2c41d7eac7263208e68ffc23f6f9b26a1442", 0x18, 0x1}, {&(0x7f00000005c0)="fc5c7a53fd9007de1e4f3defe1fb8feb02f9b9605a981375365c30fe13913d5f60a40a7d46f20ce655aefe6b905fc030035ee08d4f2c0c9b2ea4b2360c7eab6fe1a4bd0740036c5db598663e075508edcaaf506b62420e0538ebecffaae10c30d5ebb3494585bba5c585e9b8482747a0ce027dffa0bedbb88fa5edec30aac25350f596816dffb903fe3b9f194eef923512b9258a311c9172219208ab64e07ac431ba28ff99e688db97932b34c64a639c7cb793049c6b21b7d9da34692dd718ed37", 0xc1, 0x7fff}], 0x80, &(0x7f0000000840)={[{@fat=@errors_remount='errors=remount-ro'}, {@fat=@codepage={'codepage', 0x3d, '861'}}, {@dots='dots'}], [{@fowner_lt={'fowner<', r1}}, {@fsname={'fsname'}}]}) setresgid(0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20140, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x6f, &(0x7f0000000080)=0x8, 0x4) 03:33:49 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8911, &(0x7f0000000100)="218413400300c80702315f") bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 03:33:49 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x20400, 0x1be) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x90c) r1 = fcntl$getown(r0, 0x9) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000100)={0x2, 0x5, 0x7, 0x4, 0x1, 0xe3}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x1, 0x9, 0x3, 0x5, 0x0, 0x81, 0x2, 0x2, 0x4, 0x1f, 0x7fffffff, 0x7fffffff, 0x9, 0x5, 0x7, 0xa4b, 0x9, 0x2, 0xfa3c, 0x6, 0x2, 0x0, 0x3, 0x6, 0x0, 0x9, 0x9e, 0x0, 0x7, 0x7f, 0x6, 0x21e7, 0x800, 0xb1, 0x3f, 0x3ff, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x10000, 0x9, 0x3cbc, 0xf, 0x7, 0x3, 0x6}, r1, 0xc, r0, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@security={'security\x00', 0xe, 0x4, 0x598, 0x270, 0x0, 0x0, 0x368, 0x368, 0x4c8, 0x4c8, 0x4c8, 0x4c8, 0x4c8, 0x4, &(0x7f0000000140), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x19}, @empty, [0xffffffff, 0xff000000, 0xff0000ff, 0x8d28049ca65746a2], [0xff, 0x0, 0xffffffff], 'hwsim0\x00', 'veth1_to_bond\x00', {0xff}, {0xff}, 0xbb, 0xffff, 0x2, 0x28}, 0x0, 0x248, 0x270, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x1, 0x6, 0x1, [0x97, 0x7, 0xffffffff, 0x3ff, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x659, 0x3, 0x9, 0x7, 0x6, 0x0, 0x5], 0xf}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x2, 0x5, 0x80000000, 0x7, 0x10, 0x1, [@local, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x18}, @loopback, @loopback, @dev={0xfe, 0x80, [], 0xd}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @mcast1, @mcast1, @local], 0x2}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x8af, 0x3}}}, {{@uncond, 0x0, 0xc8, 0xf8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x5, 0x7f, 0x3, 0x1}}}, {{@uncond, 0x0, 0xf0, 0x160, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x1, 0x9}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x7, 0xfffffffffffff97a, 0x4, 0x0, 0x0, "97f26f103a41ec77e845df0c4a505fe0e16d14b847158a6d08da44952d5913ef552291798f3d9ecad7eb70449ea6bd10f8df016f8e1e656c8a28a2aa60b89ca3"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) sendto$inet(r0, &(0x7f00000013c0)="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", 0x1000, 0x8810, &(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x24f) 03:33:49 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @initdev}, &(0x7f0000000080)=0xc) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000011c0)) 03:33:49 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x27) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x57}) accept(r1, &(0x7f0000000000)=@nl, &(0x7f0000000080)=0x80) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:33:49 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r2) setuid(r1) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r3) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100), 0x10) keyctl$chown(0x4, r3, r1, 0x0) 03:33:49 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) socketpair$unix(0x1, 0x4000001000000001, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:33:49 executing program 4: setfsgid(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) r1 = openat$cgroup_type(r0, 0x0, 0x2, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0xa) inotify_init() write$binfmt_elf64(r1, 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x3f, &(0x7f0000000000)="39e7261a20d7d8ac5edcf3c4f392bddd01ef888433378bff84598178dad2b774f7571f4bc8de1c2ae9db0dfa56a7fbb5a79a7bcd77a514ca8856fb89fef2d58ca5db6390e9dcfec1e22c9e93c3f13ed22f593dc0035afbc7eedc2b06571118a845db5269526d4b4bb1f09ce75d48d39a0fae7cdcce31e1531f379627a8b1a17fde32890101454fcf2d317c8b5033c939bfb49010711a8ddca201574d34fc7cc999b0b19152a455314066ebdbfda8c080a7a8aab128d4887e751f92c821725009d4d7a116189f5e88e046df8215b88d1da72d2ea74aff0cc5e479ddaa1a05acaf06d195d0f513ef7ad428120efc3b4ef715a3eddcef1d40", 0xf7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) syz_mount_image$ext4(&(0x7f0000000500)='ext3\x00', &(0x7f0000000540)='./file0\x00', 0xd12, 0x0, &(0x7f00000006c0), 0x0, 0x0) [ 388.371955] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:33:50 executing program 4: r0 = socket$inet6(0xa, 0x23, 0x800000000000030) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) 03:33:50 executing program 0: prctl$PR_SET_TSC(0x1a, 0x0) madvise(&(0x7f0000000000/0x4000)=nil, 0x0, 0x0) 03:33:50 executing program 2: r0 = socket(0x11, 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) rt_sigprocmask(0x0, &(0x7f0000000180)={0x51a7}, 0x0, 0x8) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f0000000040)}, 0x9) sendto$packet(r0, &(0x7f0000000080)="756b27c74c04065daf65cfa0e8fb776d1d29a10c032e3f9b2eed", 0x1a, 0x0, &(0x7f00000001c0)={0x11, 0x8100, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000140)=0x8) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8001) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200)='./file0\x00') 03:33:50 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0xc64d7e6b6256c763, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14, 0x800) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@multicast2, @broadcast, 0x0}, &(0x7f00000005c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000006c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14, 0x80000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @loopback, @loopback}, &(0x7f00000007c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000002380)={'team0\x00', 0x0}) recvmmsg(r0, &(0x7f0000009640)=[{{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000023c0)=""/154, 0x9a}, {&(0x7f0000002480)=""/191, 0xbf}, {&(0x7f0000002540)=""/232, 0xe8}, {&(0x7f0000002640)=""/14, 0xe}, {&(0x7f0000002680)=""/227, 0xe3}, {&(0x7f0000002780)=""/85, 0x55}], 0x6, &(0x7f0000002880)=""/147, 0x93}, 0x9}, {{&(0x7f0000002940)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x80, &(0x7f0000002b80)=[{&(0x7f00000029c0)=""/67, 0x43}, {&(0x7f0000002a40)=""/122, 0x7a}, {&(0x7f0000002ac0)=""/108, 0x6c}, {&(0x7f0000002b40)=""/40, 0x28}], 0x4, &(0x7f0000002bc0)=""/235, 0xeb}, 0x1}, {{&(0x7f0000002cc0)=@l2, 0x80, &(0x7f0000005040)=[{&(0x7f0000002d40)=""/219, 0xdb}, {&(0x7f0000002e40)=""/4096, 0x1000}, {&(0x7f0000003e40)=""/74, 0x4a}, {&(0x7f0000003ec0)=""/4096, 0x1000}, {&(0x7f0000004ec0)=""/112, 0x70}, {&(0x7f0000004f40)=""/59, 0x3b}, {&(0x7f0000004f80)=""/69, 0x45}, {&(0x7f0000005000)=""/21, 0x15}], 0x8, &(0x7f00000050c0)=""/136, 0x88}, 0x67e7}, {{&(0x7f0000005180)=@rc, 0x80, &(0x7f0000005600)=[{&(0x7f0000005200)=""/39, 0x27}, {&(0x7f0000005240)=""/94, 0x5e}, {&(0x7f00000052c0)=""/71, 0x47}, {&(0x7f0000005340)=""/202, 0xca}, {&(0x7f0000005440)=""/64, 0x40}, {&(0x7f0000005480)=""/75, 0x4b}, {&(0x7f0000005500)=""/83, 0x53}, {&(0x7f0000005580)=""/110, 0x6e}], 0x8}, 0x4}, {{&(0x7f0000005680)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000006dc0)=[{&(0x7f0000005700)=""/240, 0xf0}, {&(0x7f0000005800)=""/92, 0x5c}, {&(0x7f0000005880)=""/16, 0x10}, {&(0x7f00000058c0)=""/187, 0xbb}, {&(0x7f0000005980)=""/134, 0x86}, {&(0x7f0000005a40)=""/193, 0xc1}, {&(0x7f0000005b40)=""/74, 0x4a}, {&(0x7f0000005bc0)=""/244, 0xf4}, {&(0x7f0000005cc0)=""/209, 0xd1}, {&(0x7f0000005dc0)=""/4096, 0x1000}], 0xa}, 0x4}, {{&(0x7f0000006e80)=@alg, 0x80, &(0x7f0000008400)=[{&(0x7f0000006f00)=""/129, 0x81}, {&(0x7f0000006fc0)=""/247, 0xf7}, {&(0x7f00000070c0)=""/162, 0xa2}, {&(0x7f0000007180)=""/4096, 0x1000}, {&(0x7f0000008180)=""/171, 0xab}, {&(0x7f0000008240)=""/225, 0xe1}, {&(0x7f0000008340)=""/176, 0xb0}], 0x7, &(0x7f0000008480)=""/187, 0xbb}, 0x80}, {{&(0x7f0000008540)=@alg, 0x80, &(0x7f0000008940)=[{&(0x7f00000085c0)=""/135, 0x87}, {&(0x7f0000008680)=""/194, 0xc2}, {&(0x7f0000008780)=""/84, 0x54}, {&(0x7f0000008800)=""/16, 0x10}, {&(0x7f0000008840)=""/215, 0xd7}], 0x5}, 0x8000}, {{&(0x7f00000089c0)=@un=@abs, 0x80, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/124, 0x7c}, {&(0x7f0000008ac0)=""/233, 0xe9}], 0x2, &(0x7f0000008c00)=""/145, 0x91}, 0x100000001}, {{&(0x7f0000008cc0)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000008d40)=""/67, 0x43}, {&(0x7f0000008dc0)=""/157, 0x9d}, {&(0x7f0000008e80)=""/160, 0xa0}, {&(0x7f0000008f40)=""/15, 0xf}, {&(0x7f0000008f80)=""/228, 0xe4}], 0x5, &(0x7f0000009100)=""/130, 0x82}}, {{0x0, 0x0, &(0x7f0000009540)=[{&(0x7f00000091c0)=""/150, 0x96}, {&(0x7f0000009280)=""/240, 0xf0}, {&(0x7f0000009380)=""/48, 0x30}, {&(0x7f00000093c0)=""/154, 0x9a}, {&(0x7f0000009480)=""/10, 0xa}, {&(0x7f00000094c0)=""/88, 0x58}], 0x6, &(0x7f00000095c0)=""/68, 0x44}, 0x80}], 0xa, 0x10100, &(0x7f00000098c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009940)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000009a40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000009ec0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000009e80)={&(0x7f0000000800)=ANY=[@ANYBLOB="ecce0000", @ANYRES16=r4, @ANYBLOB="000425bd7000fedbdf250200000008000100", @ANYRES32=r5, @ANYBLOB="d00102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000100000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400010000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e670000000000000800030003000000080004004c41a521756648a1f96c052326474d7ecd09860dde8bcaad164d0df465202c2041ed357358d3888b7ddc8a2ebf4e2b1eb9a54d80a941f89e2ea8e05bfb6be57b3f38b8a69c5d", @ANYRES32=r9, @ANYBLOB="080007000000000034000100240001006270666512da5c26a3405f686173685f66756e6300000000000000000000000000000000000000080003000b00000004", @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="c400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff0f000008000600", @ANYRES32=r14, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x3ec}, 0x1, 0x0, 0x0, 0x4010}, 0x44000) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:33:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file1\x00', 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) listxattr(0x0, &(0x7f00000003c0)=""/237, 0xed) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x108, 0x0) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x2) execveat(r1, &(0x7f0000000200)='./file1\x00', 0x0, &(0x7f0000000400), 0x0) open(&(0x7f0000002a40)='./file1\x00', 0x240, 0x0) 03:33:50 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0xc) utime(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x3, &(0x7f0000000340)=0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/enforce\x00', 0x200, 0x0) io_cancel(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f00000003c0)="e66fa99aa9a9e7cb4d3344758856708eb2db2267bba28f00be34791866e648e161b0c6e154a7e6bc4f9ef55d6c5b7be81c279e0cfab1d96df2a29c9c3f19e5ee4cf6608eb337db5a1901ac68c2873786e0bb41d53782259d8a939fd598ed50f04b15f1d69b75fb1feb37003b39537b2356bff85073c36d", 0x77, 0x7, 0x0, 0xffffffffffffffff, r2}, &(0x7f00000004c0)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000002c0), 0x8) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) socket$netlink(0x10, 0x3, 0x4) eventfd(0x2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$getown(r3, 0x9) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x1c, 0x0, 0x7fff, 0x3, 0x0, 0x1, 0x1014, 0xe, 0x4, 0x9, 0x3f, 0xfffffffffffffffd, 0x9, 0x6, 0x7fff, 0x9, 0x100000000, 0x3, 0x5, 0x8001, 0x0, 0xe07, 0x80000001, 0x5, 0x4, 0xfff, 0xffff, 0x81, 0xffffffffffffffff, 0x7f, 0xff, 0x1, 0x0, 0x49, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x2400, 0x100, 0x73fa, 0x3, 0x8, 0x43447af2, 0x3}, r4, 0xb, 0xffffffffffffff9c, 0xb) 03:33:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") clone(0x2103001fc0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() sync_file_range(r0, 0x7, 0x7ff, 0x4) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000080)={0x6}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) wait4(0x0, 0x0, 0x0, 0x0) 03:33:50 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000940)={@in={{0x2, 0x4e23, @broadcast}}, 0x0, 0x4, 0x0, "f50154ae7b122baf940f7e9715f8bff5844776a9471f05f1e2a38acea82a82949874b0c930559f686b2d13b46263347f163a79d990e6aa2434fce9aa8fdc7da3311b8a45a1eae146e5af4bf07c3f84a1"}, 0xd8) socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000002e40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fdatasync(r1) clone(0x2e828903, 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/rtc0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x8000000000000014) wait4(r2, 0x0, 0x0, 0x0) r3 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) prctl$PR_GET_DUMPABLE(0x3) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000480)='./file0\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f0000000a80)={'ipvs\x00'}, &(0x7f0000000ac0)=0x1e) stat(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)) 03:33:50 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x44) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x20000, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f00000000c0)=0x8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000240)='io\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) 03:33:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$getregs(0xc, r1, 0x0, &(0x7f0000000180)=""/250) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$setregs(0xf, r1, 0x9, &(0x7f0000000280)="2bd29b4bf3f3047f47950303eb67505a71c9f4eda06de785cbeff5f9d9e84f146f03d36915a180be475b4d9ec3e9731118d845fb9343b8f9e7281f262d16c0fae37380d0b4578ede14907603a7baa8f61d859958f0f63a84f3d9f2b17e83f015117247e557d14138a4bd5da8f5a2c757c12de60119f9a279e8d053ba63a66f8732072f855271e55102e71f9c5c9ac386") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:33:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp\x00') ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000740)=0x200080) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000200)=""/201) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20000) sendto$inet(r1, &(0x7f0000000300)="55a606a6711de75aa1c219455449c993cfee197e613c9c6fc860683988552b7ebfcd2dda3b79df6cc88d2a59c1a829877c40c5e8275a70c2efe8c59768b29828ef1c0063f4bd9c0c04417e116eb1e56361f4f5622ec39ce70bdd09e8901849220393bb67f38aabb2fd0fb16a00f6b8067e400b6e63285bd0428349483c77d41f42e3f1376e01fd5e7de2f4a80be6958d4ce1adbcc63f52b593a0c06b36d10cb66e735545bda5ed886d4ea1897e510edb16ce4e79975d54f35724d5110c7c4b6a", 0xc0, 0x4800, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000600)={0x7, 0x21, 0x1}, 0x7) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000001840)=""/4096) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x40000000161046, 0x4010) sendmsg$nl_route_sched(r3, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1600400}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@newtaction={0x1e0, 0x30, 0xc, 0x70bd28, 0x25dfdbfd, {}, [{0xb4, 0x1, @m_nat={0xb0, 0x5, {{0x8, 0x1, 'nat\x00'}, {0x2c, 0x2, @TCA_NAT_PARMS={0x28, 0x1, {{0x805f, 0x5, 0x20000000, 0x800, 0x5}, @multicast2, @local, 0xff, 0x1}}}, {0x74, 0x6, "06f0ca0cda43526f3aef8d6f520e8316e086da19c07a0489a963d638fe4261832c90f8d4b0f2f6a2b45e696569bc7491267cfa65cce05d8f3ba74ab2ae11a9901a4d9dabe6d84fc42cffb2305eb84ab2382b3e55cf5070b4a01cc8d39a9cd4915cd72cca2e2bb92e0ca03d4a5f8a33"}}}}, {0x118, 0x1, @m_vlan={0x114, 0x5, {{0xc, 0x1, 'vlan\x00'}, {0x6c, 0x2, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x8, 0x6, 0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x8, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x400000, 0x400, 0x10000007, 0xa82, 0xc8b}, 0x3}}, @TCA_VLAN_PUSH_VLAN_ID={0x8, 0x3, 0x1dd}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x8, 0x6, 0x3}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x3, 0x3, 0x3ff, 0xffffffffffff488e}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x8, 0x6, 0x1}]}, {0x94, 0x6, "9696bd39a622ea58d15251de7883c034de97403d62daad9322147fe4f355484d7207828dbb31a191b67f6e082afebba112ce0ecac25a34b6a6a1aeba8fc5ce35630bb625f6babe43b919ff7e89f532385f33d6628d5f53490b6e975b9ec47653130c72aae32327b87f474fe09229f3173690d33e923f245cab0d158832ba9b3d781f0ccaa6d9d4183945ee6dc51a"}}}}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x24048094}, 0x0) sendmsg$key(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB="021307030600000025bd7000fcdbdf25010016004e210000010017004e22000002000be9ffffff000300000000000000"], 0x30}}, 0x40) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000700)) ftruncate(r4, 0x2007fff) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000ffeffffe) write$P9_RLINK(r3, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) 03:33:50 executing program 2: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @local}, 0x2, 0x0, 0x0, 0x0, 0x7fff, &(0x7f0000000040)='veth0\x00', 0x800, 0x4857bf3a, 0x401}) accept4$inet6(r1, 0x0, &(0x7f00000001c0), 0x0) pread64(r0, &(0x7f0000000000)=""/32, 0x20, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101080, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x5, 0x4) fcntl$addseals(r0, 0x409, 0x8) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000080)={0x10000011}) setsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000280)="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", 0x1000) fallocate(r1, 0x1, 0x0, 0xb) 03:33:50 executing program 4: r0 = gettid() syz_open_procfs(r0, &(0x7f0000000000)='net/snmp6\x00') 03:33:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x410400, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000000c0)=0x1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000040)=0xc, 0x4) unshare(0x800) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001b9, 0x0) 03:33:50 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:50 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000001000)={0xa, 0x0, 0x0, @empty, 0x2}, 0xfffffffffffffee4) sendmsg(r0, &(0x7f000000cfc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000026f78)=[{0x18, 0x29, 0x37, '\x00'}], 0x18}, 0x0) 03:33:50 executing program 2: mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000240), 0x2e9) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(0x0, &(0x7f0000000140)=""/105) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f00000001c0)}, 0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) write$P9_RLERROR(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:33:50 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x27}}, &(0x7f0000000140)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) 03:33:51 executing program 4: r0 = gettid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x4, 0x8, 0x400, 0xffffffff80000000, 0x0, 0x20, 0x8, 0x1, 0x6815, 0xfffffffffffffffe, 0x9, 0x12, 0x4, 0x9, 0x4, 0x7603, 0x1, 0xff, 0x46, 0x8, 0x4, 0x4b5, 0x4, 0x7, 0x8, 0x5, 0x4, 0x1000, 0x7ff, 0xfffffffffffffff9, 0x8, 0x3243, 0x1000, 0xffffffff, 0x4, 0x1, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x9}, 0x8000, 0x1, 0x6, 0xf, 0x3, 0x80000000, 0x5}, r0, 0x9, 0xffffffffffffff9c, 0x2) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xfffffffffffff7f9) truncate(&(0x7f00000000c0)='./file0\x00', 0x63) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10000000170100855200000000000030"], 0x10) 03:33:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) bind$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:33:53 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) capget(&(0x7f0000000080)={0x2019980330}, &(0x7f0000003840)) ioctl$TCXONC(r0, 0x540a, 0x7) 03:33:53 executing program 5: mknod$loop(&(0x7f0000000300)='./file1\x00', 0x0, 0xffffffffffffffff) clone(0x4000000000000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigpending(&(0x7f00000001c0), 0x8) r0 = gettid() syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='hpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)) wait4(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) 03:33:53 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_int(r2, 0x0, 0xb, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000000), 0x4) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x6c, r3, 0x10, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r1}, {0x8, 0x1, r2}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x6c}, 0x1, 0x0, 0x0, 0x11}, 0x4000040) 03:33:53 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4c67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xa5bdc2fb7d5daec9, &(0x7f00000005c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="a2d2a2be80d98d94d22a38d25c8a2a2ac47ca3fb04ed4b1beda76c3e3b7b7f4ab1acafa356636ed17fea090c96f2ededc04ad9ef3dfc7e512abc3da75bfcf409098785797d5848429842c13ec58df29379c889f7941a3fc9e4243ab017d89c4a6f84f7e0ad5787d02cb9bc5c930196ab92856de9ba1e7a45918d02f65b6a0dc474e79c33828ced0da3ab63579e5ed1212948aca914f0d54a51be67927fe3725414e1b09afea0b854285ff538b3196b4c2031af98b872bf7b32cfdf2cf97f3089ee10905513", @ANYPTR]}, 0x1, 0x0, 0x0, 0x80000000040000}, 0x7fffffffff) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad403606", 0x3c}], 0x1, 0x1) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f00000006c0)={0x4, 0x0, 0x0}) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$EVIOCGABS0(r4, 0x80184540, &(0x7f0000000900)=""/199) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r6 = add_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000500)="47b209f726d2bc6606dce36934359327e755da0b999e1673551f1ebe665753446baa030e38ba28fd7a7603652ecbdfff0364c778607665b66d358b34e1a0ce8867582a6b2c57bceecbb16039eb0462bad23d6bf034fb575cbf4ad4711c80c1de84fb88eea6682ec1bf8001d3b1", 0x6d, 0xffffffffffffffff) keyctl$reject(0x13, r5, 0x1f, 0x1, r6) rt_sigpending(&(0x7f0000000280), 0xffffffffffffff68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x10000009) add_key(&(0x7f0000000880)='keyring\x006\xf9\x12l\x12\x05O\\\x0e\x18\xc6R%s\xddy\xf1\xa0\xa3\xa6\tW\xd6\xc7)\xad\x85l\xd8\xf0\xdf\x9c\x04\xd1\x8eW\x90K\x1c\x05 \x9d\xee\x12\xf5\xcc\xc1-\x98\xa7\x007g46a\x0f\xaa\xc8\x8b\xcf\x96\x81\x91\x87\x89\xc2\xadG6e\x98K\x17\x86\x8d\x9c^\x90\x81>\x9e\xc1\xf7?\xde\xbfV8\xf9\xc0\x1f\x88!\xf1\xf7\x8e\xba\xc9\x84\xe3\x85.\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000007c0)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000040), 0x50) prctl$PR_SET_FPEMU(0xa, 0x3) socket$inet6(0xa, 0x80000, 0x6) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 03:33:53 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f00000000c0)=[{0x35, 0x20000000, 0x2, 0xfffffffffffffffc}, {0x0, 0x0, 0x0, 0x4}, {0x9}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40080, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000001340)={0x3, &(0x7f0000001300)=[{}, {}, {}]}) setxattr$trusted_overlay_origin(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='trusted.overlay.origin\x00', &(0x7f0000001180)='y\x00', 0x2, 0x2) getsockopt$sock_buf(r0, 0x1, 0x1b, &(0x7f0000000100)=""/4096, &(0x7f0000000080)=0x1000) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000001380)='trusted.overlay.upper\x00', &(0x7f00000013c0)={0x0, 0xfb, 0x4a, 0x4, 0x5, "9f72d8dd301fd38cce44e802c68c2106", "c0e82672617fa96db8fabce37e6c9a1d588618426af6c4863a42aba75f71f15023ff795d569d765fd8eb66fff5b2883a88fc3e1b9b"}, 0x4a, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001200)='TIPC\x00') clock_gettime(0x0, &(0x7f0000005a40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000005940)=[{{&(0x7f0000001440)=@nl=@proc, 0x80, &(0x7f0000001840)=[{&(0x7f00000014c0)=""/243, 0xf3}, {&(0x7f00000015c0)=""/75, 0x4b}, {&(0x7f0000001640)=""/183, 0xb7}, {&(0x7f0000001700)=""/233, 0xe9}, {&(0x7f0000001800)=""/55, 0x37}], 0x5, &(0x7f00000018c0)=""/4096, 0x1000}, 0x7fffffff}, {{&(0x7f00000028c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000002940)=""/52, 0x34}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/158, 0x9e}, {&(0x7f0000003a40)=""/125, 0x7d}], 0x4, &(0x7f0000003b00)=""/209, 0xd1}, 0x2}, {{&(0x7f0000003c00)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000005140)=[{&(0x7f0000003c80)=""/122, 0x7a}, {&(0x7f0000003d00)=""/174, 0xae}, {&(0x7f0000003dc0)=""/2, 0x2}, {&(0x7f0000003e00)=""/88, 0x58}, {&(0x7f0000003e80)=""/112, 0x70}, {&(0x7f0000003f00)=""/252, 0xfc}, {&(0x7f0000004000)=""/168, 0xa8}, {&(0x7f00000040c0)=""/89, 0x59}, {&(0x7f0000004140)=""/4096, 0x1000}], 0x9, &(0x7f0000005200)=""/73, 0x49}, 0x2139}, {{&(0x7f0000005280)=@hci, 0x80, &(0x7f0000005800)=[{&(0x7f0000005300)=""/154, 0x9a}, {&(0x7f00000053c0)=""/242, 0xf2}, {&(0x7f00000054c0)=""/167, 0xa7}, {&(0x7f0000005580)=""/39, 0x27}, {&(0x7f00000055c0)=""/106, 0x6a}, {&(0x7f0000005640)=""/62, 0x3e}, {&(0x7f0000005680)=""/214, 0xd6}, {&(0x7f0000005780)=""/94, 0x5e}], 0x8, &(0x7f0000005880)=""/139, 0x8b}, 0x8}], 0x4, 0x2000, &(0x7f0000005a80)={r2, r3+10000000}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000012c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x1c, r1, 0x4, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40) 03:33:53 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r1, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/81, 0x51, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r4, 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast2, @loopback}, &(0x7f00000002c0)=0xc) write$uinput_user_dev(r1, &(0x7f0000000340)={'syz1\x00', {0x20, 0x10001, 0x9, 0x1}, 0xf, [0x20, 0x4, 0x9, 0x6ae, 0x0, 0x80, 0x2, 0x7, 0x0, 0x8001, 0x7, 0x2, 0x8b, 0x9, 0x8, 0x9, 0x9, 0x9, 0x1ff, 0x9, 0x10000, 0x100000000, 0xffffffff80000001, 0x2326, 0x9a8, 0x9, 0x6, 0x5, 0x1, 0x5, 0x800, 0x8001, 0x9, 0x29c00, 0x9, 0x10000, 0x0, 0x7, 0x800, 0x0, 0x1, 0x7fff, 0x2, 0x9, 0x7f, 0x6, 0x2, 0x4, 0xce3, 0xff, 0x4, 0x20000, 0x1c38, 0x6, 0x9, 0x3f, 0xffffffff7fffffff, 0x7, 0x5, 0x100000000, 0x0, 0xb67, 0x40, 0x20], [0xffffffff, 0x152f, 0x2a0, 0x9, 0x5, 0x9, 0x1000, 0x3ff, 0x40, 0xffffffffffffffc0, 0x4, 0x58f, 0x3e, 0x3, 0x7ff, 0xf9d, 0x70000000000, 0x6e, 0x100, 0x18db, 0x7, 0x80, 0x1, 0x3e, 0x2, 0x800, 0x7ff, 0x5, 0x6, 0x2, 0xc7b1, 0x80000000, 0x9, 0x186, 0x6, 0x100000001, 0x6, 0x80000000, 0xffffffffffffffff, 0x8001, 0x1a5, 0x7fff, 0x7c0, 0xbbf3, 0x6, 0x4b9, 0xffffffffffffff84, 0x5, 0xfffffffffffffffc, 0x447aa918, 0x8, 0x1d5, 0x1, 0x1, 0x3, 0xda2, 0x9, 0xfffffffffffffffb, 0x80, 0x6, 0x5, 0x8001, 0x1f, 0xb6], [0x84, 0x401, 0x2, 0x7, 0x8000, 0xee8d, 0x752, 0x6, 0x0, 0x6, 0x0, 0xf0ad, 0x1, 0x0, 0x5a0, 0x101, 0x0, 0x7, 0x1, 0x7f, 0xfffc000000000000, 0x3, 0x7, 0x9802, 0x2f2, 0x8, 0x9, 0x10000, 0x2, 0x8, 0x5, 0xfffffffffffffffc, 0x1, 0x9, 0x9, 0xffffffffffff7fff, 0x80000000, 0x1, 0x101, 0x3, 0x7, 0x3, 0x7fff, 0x80, 0x8, 0x65, 0x4, 0x734d, 0x9, 0x3, 0x9b, 0x8, 0x8001, 0x8, 0x28, 0x7, 0x9, 0x4, 0x4, 0x7, 0x2, 0x1, 0x4, 0x401], [0xda, 0x5, 0x7, 0x8, 0xaea4, 0x3, 0x2a38, 0x0, 0x3, 0x2, 0x40, 0x9, 0x0, 0x1ff, 0x3, 0x8, 0x100000001, 0xffffffff, 0xffffffff, 0xf77, 0x8, 0x0, 0x3, 0x7f, 0x0, 0xeb43, 0x7, 0x0, 0xffffffffffffffc1, 0x4, 0x0, 0x7f, 0x7, 0x5, 0x6, 0x3, 0x80000000, 0x1, 0x2, 0xffffffff, 0x6, 0xba, 0x4, 0x4, 0x3, 0x9, 0xffffffff00000001, 0x800, 0xde, 0x4, 0x0, 0x7, 0x0, 0x4, 0x5, 0x8, 0x7, 0x200, 0x9, 0x1, 0x0, 0x9, 0x120000, 0x3b24]}, 0x45c) fcntl$setstatus(r0, 0x4, 0x42800) writev(r3, &(0x7f000000b000)=[{&(0x7f0000066000)=',', 0x1}], 0x1) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) tee(r2, r1, 0xb2, 0x0) unlink(&(0x7f0000000300)='./file0\x00') 03:33:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3fffff14, &(0x7f0000001380)) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r10, 0x1, 0x2a, &(0x7f0000000040), 0x4) bind$inet(r10, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r10, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r10, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x85, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r10, &(0x7f0000c95ffd), 0x0, 0x0, 0x0, 0x0) r11 = openat$keychord(0xffffffffffffff9c, &(0x7f0000001280)='/dev/keychord\x00', 0x40, 0x0) sendmmsg$unix(r11, &(0x7f00000018c0)=[{&(0x7f00000012c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001500)=[{&(0x7f0000001340)="a6ce77d778b303fa714803ead7eac49e699c1418ac1edb7098e267cbedde0fef6107dc577cdbeee7f63efda2a5f35c62cdd9c34382cfe6e90d2a8c2bdfda2b68152065b287be7b82680105dfd4532cf8e28f9b21cfeb849d29ee2ce00721baad1ff3632463c59263a5309cac32f50f859a7d418a9ca5c8b2cc33d7fd2f7e280fcee3b5733f4f5119890a304a22065db85f3c2146d5bbf8cf5d9aaf1d7ea6d6", 0x9f}, {&(0x7f0000001400)="314a45dbb7f8074fef44cc12918dc75e6df29e82dd5952bbb432c6ce702984dcb529b4deb844e25a70ef36fb6e9555", 0x2f}, {&(0x7f0000001440)="652843860927e0b0145a7b6c03755198e87fe405a82c68f7098771511ace9fed6fc8babb32654d8a99d16f00b9aac50a1ed37c5ca5ab64dc2a3a403f53c0d94bc3381fbcc7d6ad950d5847e9002a01d65262079ea82f5629033b9380f6df965043d7d859ecbdde29eac20bd80bc23188ded9e8", 0x73}, {&(0x7f00000014c0)="e9b38f159fd604e75f8a", 0xa}], 0x4, &(0x7f0000001940)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r9, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r10, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r10, @ANYBLOB="91ab3944c91a2e565fc5dcb86af24800ffffff7f07ec3016f44f5147332b", @ANYRES32=r6, @ANYRES32=r8, @ANYRES32=r5, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0xc8, 0x50}, {&(0x7f0000001640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001800)=[{&(0x7f00000016c0)="c90fbfda4ae3b394898521fa9d098d07e75d0f77a51c05efdb21bd4f4c658e97e4b941bab511202ad19ab413678d65f9b5", 0x31}, {&(0x7f0000001700)="bfd73d9eee608b8b5076df6e0436d3435a32319dd9c91df77344f5656d192223bf03bffec6e2e1e9154a16055d18057bd466d748aea7047277d69040ef68f2bd98379191797bf25e9a3b98475eda4637edd3640b58dac107d80e4cc9f9722aafff80d939ccf74d197983ebc6121769d2c2dfe36c655e50a9b39bd67d", 0x7c}, {&(0x7f0000001780)="491b0c5c54c342b0683cf446da4ceb0896c56430a351083ee8a205c50aaa334ea931b26393583d745c4c5a464135b432e88b14e138d8952d47e80c8226819e95c5bd4c9a5d559cb4b0a481911274fc6e74c0", 0x52}], 0x3, &(0x7f0000001840)=[@cred={0x20, 0x1, 0x2, r6, r7, r5}, @rights={0x28, 0x1, 0x1, [r10, r1, r1, r0, r1]}, @rights={0x18, 0x1, 0x1, [r0, r10]}], 0x60, 0x44000}], 0x2, 0x80) 03:33:53 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:53 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) fcntl$setpipe(r0, 0x407, 0x8) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) connect$inet(r1, &(0x7f0000000440)={0x2, 0x3ffffffffffffffe, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x4e22}, {0x2, 0x4e1f, @loopback}, {0x2, 0x4e25, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x17d, 0x8, 0x5, 0x46a, 0x0, 0x0, 0x0, 0x1}) sendmmsg(r0, &(0x7f0000000500), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, 0x0) setxattr$security_capability(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000bc0)='security.capability\x00', &(0x7f0000000800)=@v3={0x3000000, [{0x1, 0x5}, {0xfffffffffffffffe, 0x6}], r4}, 0x99e91b93, 0x3) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, 0x0, &(0x7f0000000480)) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000400)=""/26, &(0x7f0000000680)=0x1a) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000c00)=""/4096) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000780)) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000007c0)=""/36) getsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000040), &(0x7f0000000180)=0x4) openat$uhid(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/uhid\x00', 0x802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00003a3000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e24, @multicast1}}, 0xffffffff00000001, 0x0, 0x2000000000003, "ed3e8c7fd106c1a6e64d11fde5d1f1f03cf686e2e33916b2ca53ee977157a1b8107e311ca16ebaa72ab5bf6f12525c51170328f9341d28ebdaffb87273bf55f7231ac08a17f78952e2460c3f30421293"}, 0xd8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000300)=""/75) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000900)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000740)={&(0x7f0000000840)={0x80, r5, 0x410, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x58}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x800}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3cfe}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x1}, 0x4044050) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000003c0)={'team0\x00', r3}) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f0000000ac0)=ANY=[@ANYBLOB="009cdc2dfda261e04ac2000002004c368892059fa554c6702efcaf2a63f168aa72d7e22926a2660712c0270b2edf397ddd683c657c6a23ee5e44bee3fc06e271283e0230de9258e1f1e173b9168b0e95c2d3464ed14f16d02fdf9b19978a58b1a3fdfddfee73eadd176c251da205694b3cfff1730d7d3fd22fbcfcd1eebd25dac5336f26bcde868be041e4817145b0d902e3e577dc7194a61d060000000000fff7ff0480e62276c5c60000498f47b21e5af24f6452f5c60c7dad30ae824b5d3790525563c89ad35a45b29192306a6eda07db19add8"], 0x1, 0x2) 03:33:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(r1, 0x0, 0x40000000, &(0x7f0000000180)) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:33:54 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:54 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:54 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x104206, r1, 0x2, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:33:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x70, 0x8, 0x3, 0x1, 0x6, 0x0, 0x100000000, 0x80000, 0x8, 0x7fff, 0x2, 0x8, 0x9, 0x1ff, 0x7f, 0x5, 0xf66, 0x2, 0x100000001, 0x0, 0x5, 0xc95e, 0x4, 0xfff, 0x6, 0x8, 0xfffffffffffffff9, 0x6, 0x3ff, 0x800, 0x6, 0x100, 0xfffffffffffffff9, 0x0, 0x9, 0x2, 0x1, 0x0, 0x80e, 0x1, @perf_bp={&(0x7f0000000500), 0x64124e905872fca9}, 0x502, 0x200, 0x1, 0x9, 0xd011, 0xfffffffffffffff9, 0x3}, 0x0, 0x0, r2, 0x1) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000280)={0x6, &(0x7f0000000240)=[{0x4, 0x3, 0x1f, 0x7ff}, {0x20766777, 0x5, 0xfff, 0x1}, {0x2, 0x7, 0x3, 0xb00}, {0x101, 0xfffffffffffffff7, 0x8, 0xfff}, {0xcb, 0x8, 0x3, 0x1}, {0x1000, 0x0, 0x7, 0x7}]}, 0x10) recvmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f00000002c0)=@nfc_llcp, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/32, 0x20}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f0000000400)=""/206, 0xce}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/175, 0xaf}, {&(0x7f0000000600)=""/24, 0x18}, {&(0x7f0000000640)=""/172, 0xac}], 0x7}, 0xe8}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000780)=""/45, 0x2d}, {&(0x7f00000007c0)=""/155, 0x9b}, {&(0x7f0000000880)=""/82, 0x52}, {&(0x7f0000000900)=""/244, 0xf4}, {&(0x7f0000000a00)=""/221, 0xdd}, {&(0x7f0000000b00)=""/228, 0xe4}, {&(0x7f0000000c00)=""/214, 0xd6}, {&(0x7f0000000d00)=""/218, 0xda}, {&(0x7f0000000e00)=""/198, 0xc6}], 0x9, &(0x7f0000000fc0)=""/244, 0xf4}, 0x9}], 0x2, 0x10001, &(0x7f0000001140)={0x0, 0x989680}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400800, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400206) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r5 = gettid() ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000001200)=r5) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) fallocate(r1, 0x20, 0x1, 0x1) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1b) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xa00000000008000) ptrace$cont(0x18, r5, 0x0, 0x0) mknod$loop(&(0x7f00000014c0)='./file0\x00', 0x214, 0x0) clone(0x4000000000000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00') ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3a) wait4(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000012c0)={'filter\x00', 0xc9, "21331bb94a323a4dbe8cbff911b2287bf541d424b0ad997876569f5af0c9072f34bf85e289707ade16dcf33f22bfc7183b3e5ad7d2e7e8dd5c547e2582723d16aad128e67a01e3be14b519289cc8c2a82e42dc57afffe3fea56ba81f93971fc7ff27a6ee0c93ba19bff41504a6c05b8757b1d28a6a9f933c7b29d6947405132d6dfeec9145f3353e53bdd2a70d833d3568e48022b6411e1f5bf102f115aa59ef430636344ac79d48732094f489392633ea0842436030178b27d843f2d0f344feb2ac31826b3bae9a90"}, &(0x7f00000013c0)=0xed) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) bind(r3, &(0x7f0000001240)=@generic={0x1d, "c69d8818368b8ddeafcc7ce3e52fde7871cf501438d61aae6783950cab4c3b73a1826ba99f45ac5dc46ee1b3f83656682fd1fab8691cee4f6f98e6a6cad4dabefbf135514991f0e7f9a2325d1e0d2ab397facea4eb8a30182054543469004885a12156e52772bbb360937c5e2bd040d964e805bf9d1829de9c611e01080a"}, 0x80) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x11) 03:33:54 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x4000000000000, &(0x7f0000000140)={0xfffffffffffffffe}, 0x0, 0xacbf843c710df1d7) rt_sigtimedwait(&(0x7f0000000200)={0x7ffffffffffffffb}, 0x0, 0x0, 0x119) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040)={0x5}, &(0x7f0000000080), &(0x7f0000000100), 0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x101000, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x3, 0x70, 0x3, 0x3, 0x9, 0x2fa, 0x0, 0x3, 0x100, 0x3, 0x6e, 0x7d70ba06, 0xab, 0xffffffff, 0xbd, 0x200, 0x0, 0x6, 0x9, 0x3, 0x81, 0x0, 0x800000, 0x7f, 0xc7e8, 0x8000, 0x3, 0x565, 0x9609, 0x1, 0x3ff, 0x4fe, 0x7, 0x1ff, 0x7, 0x6, 0x6, 0x3f, 0x0, 0x8, 0x4, @perf_config_ext={0x80000000, 0x101}, 0x800, 0x10001, 0x3, 0x3, 0x8, 0x20000, 0x9}, 0xffffffffffffffff, 0x8, r1, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0xf4, 0x11, 0x3, 0x10, 0x70bd25, 0x25dfdbfb, {0x2, 0x0, 0x6}, [@generic="5a5537a65e41f201aadd2e47236eea70b0c1a43514350222d7f79d67af14a1811e890686283f7c3dc2c5140448a1613fb5454f23e55a2825b0645da9f5d3aaf0bcad1973a19618e0e97eaecdbd3e5a658956c15a49c76355b68942b78011d10bd1b79c3388d2648143c3fbfe5dec5b3f6b7ea49ffc07242b70ba9e697b", @typed={0x4, 0x6b}, @nested={0x5c, 0x8c, [@typed={0x58, 0x50, @binary="c523629234b72cbcc9353ee54751409e3e1ac162b27ceb914419a3dd03d28161afa3f79df25ce98c630cd4c5bb58128718b47985d748b9580095611ab9411012e9e679ee9a7175e8192a1c60fdb97e001ee02c"}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40}, 0x8080) r4 = fcntl$dupfd(r3, 0x406, r3) r5 = socket$inet(0x2, 0x2, 0x200000000000) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) r6 = dup3(r3, r3, 0x5c5eb52e10e8e866) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000740)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000640)="01680de35ebc96222e9b65858c39fea5ea8aaf4ca56a0cd45e81491be170f84efdd47588787c0ca3e3fd5c4247e9eefad130434c834b5a9c328495dfd80b4edb3494b6861fc27ef834e76f46d490472e1d74d4e78794e4508e5b29d26f4b383405b1323387a92ec7a0c0b4455c58d5fbada1579e7584f1aabfc151eb2014f2690d517dcabbd169a466f4dff6082e9b0a1bff8c435833b0beb6bb99bab43332e75742b16af1674d96d585c59b381fac5fb8912847aa1c82f978350e079f1a5d57f3b9dc518040f1bd892363dc0d3d5f9919eb", 0xd2, r0}, 0x68) rt_sigtimedwait(&(0x7f0000000180), &(0x7f0000000300), &(0x7f00000001c0), 0x8) ioctl$KDDELIO(r4, 0x4b35, 0x7fff) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@remote, @in=@loopback, 0x4e20, 0x9, 0x4e20, 0x9, 0xa, 0xa0, 0x80, 0xff}, {0x0, 0x7f, 0x6, 0x18da, 0x7, 0x9, 0x2, 0x6e}, {0x7, 0x0, 0x0, 0x9}, 0x5, 0x0, 0x2, 0x1, 0x0, 0x1}, {{@in6=@ipv4={[], [], @broadcast}, 0x4d4, 0x3b}, 0x0, @in=@rand_addr=0x6923, 0x0, 0x0, 0x0, 0xfffffffffffffc00}}, 0xe8) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000240)=0x1) write$UHID_CREATE2(r2, &(0x7f0000001040)=ANY=[@ANYBLOB="0bffdd0073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005ac80d8800000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000cc090000000000005b2389efec0000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000ebffffff00000000000000000000000000000000000000000000000000000000000000cb00ffff1e000000001000000400000080000000fd4e1e56b9abc1b958d06644e4fe52353cd59fc471117ee81d2cbd1f9d073edb310fd1f122d96d27fa817ac148846e11e23ad3a0506fa9932db825e2d9272049686f10c08b70042b4a4e6229caad835411cb88c75d41505ef615e07e41a5af6badb5ef2720e2e51019bc7a39e35e396260cb59caebdcffd953ea3186075aca992eb0321bf86c06dd07877ec9618dd9945a8b3ded972da9fa9d0dbd3196c29e627175710fab1d3368a918d5cd464ca4303c338f368e7593c9b4ce34cc7161c11fdbf88421bef2c70996ee36c58c6a6c5e45a5220f71ba5ac435727840c986750bddaab625b9f7059367cef309133b940e08c415bd6fd6581ef4994b362d181b4f7c0000009092f3dd19d2300e1905690093da7ecac2ba091fef1b68ee227114b1793716d70b972c220f2a76f0be9725e7b24f693045880459898d00c2eb77c5f2462aee344270c89e99e5f6e670e274193437a40a327994e31fdbd10169491c87f3f94f88605e0b4faf6bab7dc2e6d6f9a268089d27c836e34c87e7866349b841913b2b6da3bc129f5f1312b0a8e956c02f26bae0810ce88dffb2ead03d29794dff2a79a2648715d915cf5d5949719360cde956428e2771e5d2094a2f4c5591419d16fc97c89beb7f6fbd52033464e0ac64ebb70ee23dce84e1f3d50fa73bc282b5753eff63742f53fbe85de79aeb875d3eb8cade743cc2fca17a71c4e2ea51312f4df3fbb6e7a1a36c7f9775292b8f249e838186c181d56120d43ce7758f9ee6d69ee5d7484e3d1453a2294bd0dc449c5d0c8aeeb1139872861664bc99ba249f1c8250a2c9c1f81bc87131e284392e565fcec9569faaf0db6689cec820b548d8228541b84dc9ffab0453f70e637a9e2c1fdc00"], 0x1) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000008c0)) [ 393.299736] cgroup: cgroup2: unknown option "¨6Š›ø]cše!­?šôeéòcÎZ%š" 03:33:54 executing program 2: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x13d}) tkill(r0, 0x23) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x7) 03:33:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x80000) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x200000000000000, 0x0) [ 393.343639] cgroup: cgroup2: unknown option "¨6Š›ø]cše!­?šôeéòcÎZ%š" 03:33:54 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:54 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'netdevsim0\x00', 0x200}) sync_file_range(r0, 0x0, 0x6, 0x6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:33:55 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x6, 0x1, 0x1, 0x8, 0x6, 0x2}, &(0x7f0000000040)=0x20) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x379427e0c5a6171, 0x7ffffff7) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000100)={0x3ac, 0x800}, 0xc) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) personality(0x20008) uname(&(0x7f0000000440)=""/176) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:55 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:55 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13302002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000140)) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000001c0)="fdb0a385546be15fb3bba65f67a3f20312a1aef683630a1f3d215229f434896cd1ee4d80ed7e7f26fb063e5ea4f7b7d3042e8fe5c95230c12c93784e650a5405c1d258215bc3640d89c0a7") ptrace$cont(0x1f, r1, 0x0, 0x0) 03:33:55 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000100)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x6, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) syz_emit_ethernet(0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="8b651c391e4b5befa017ef2aa6c873bdc583e473d5f789e3787ceeb4c8589e082e8be87d92739f5ad692cba423d3778b49bff48d8e81fd879df773431e1dd6dcd05f077bbec0b292c1e1f7b78b84c712491f7ae2557e614e1608fb23e8c89b", @ANYRESDEC], 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x404, 0x0) 03:33:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x8080, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000340)) r2 = socket(0xb, 0x800, 0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="24010000cfcdedf1ab33f46a073199a3ab9b3138951f6fc5fa4580bd95a9a1ec89656b4d289ff49268c53794c648e0e74607eb00ff54be845b8d5449124ca9f60cbd85662b6b9ef7b283cf6034e42120d39da344b4874519800963a28642fb0a001e40a31691b222b7140da9ecf16689671bc918c6f27210da870582f08249d55048db85fb1d4202e1ce82266259c5af941278694d8e2e09e39db70902f349cb924b4d1ca932718f6ab0ca9df8a067571215b081f3b8544c2691b78ca95d9642459500cf33972ac8bada3ca68c0115399925c99e5e76944b4d2df619", @ANYRES16=r3, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x4000}, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000004640)=[{{&(0x7f0000000140)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) 03:33:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2ffffffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000500), 0xffffffffffffffff) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffffffffffd, 0x5, 0x3, 0x5, 0x101}, 0x14) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x100000) mkdirat$cgroup(r1, &(0x7f00000001c0)='syz0\x00', 0x1ff) tkill(r2, 0x30) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000400)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) recvfrom$packet(r3, &(0x7f0000000240)=""/142, 0x8e, 0x0, &(0x7f0000000340)={0x11, 0x1f, r5, 0x1, 0x81, 0x6, @dev={[], 0xf}}, 0x14) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x3f, r2, 0x0, 0x0) 03:33:57 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4048804) 03:33:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x2, &(0x7f00000001c0)=0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x200000, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x2000, 0x0) io_submit(r2, 0x2, &(0x7f00000004c0)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x9, r0, &(0x7f0000000200)="97f8d07ae0bf83144fc8e1f78432f2602661196b779e3a05c076fbaa63e352e4622d8de0a156f73cd5111f6380a6b1f520ae220a925589862d5bf8c2e40fd99a711eae7a700c3e049e353469034fe8cbce30d413ec83e5605c9332df302eebdfa32ef7e6f9e2562233785571a2ad6f3651c00576d998e3dc440edf10b1ef1ced8bf8a7c29f675311de69", 0x8a, 0x4, 0x0, 0x1, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0xffffffff, r1, &(0x7f0000000400)="a0a58d05f458d3258bf1aa291070ef6dfdd1bb2b7d7e57c5fa0ed808c9bb4374a7315406027241571efeb576ae443053e8ae9af8b0de4326752c98d48746d9832a193ef4a2594b74b44f05dd03a9eb77a9c4d2d460a3265727ee9df1689faeb133f910e1a0c14d01a2a128f67858ca192df743456ce9ee9e88211771095b47773416a25b4699ab7931b120620be412100cd40bdd3854b80dcd54c32325fe2ae0809472361869289bf8a3", 0xaa, 0xd32a, 0x0, 0x0, r4}]) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r5 = gettid() r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKALIGNOFF(r6, 0x127a, &(0x7f0000000180)) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) syz_open_procfs(r5, &(0x7f0000000040)='setgroups\x00') ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1b) ptrace$cont(0x18, r5, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r5, 0x0, 0x0) 03:33:57 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000005000611000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) fstatfs(r0, &(0x7f0000000240)=""/4096) sendmmsg(r0, &(0x7f0000000180), 0x0, 0x0) 03:33:57 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff) r0 = socket(0x0, 0x20000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000100)) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=@random={'user.', '+&\x00'}, &(0x7f00000002c0)='/dev/nullb0\x00', 0xc, 0x0) 03:33:57 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = getpid() fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = socket(0x20210, 0x7, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) write(r2, &(0x7f0000d02fb4)="220000002100070700be00000900070102e9dc1e0000ff000000000005000280ff45", 0x22) 03:33:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000001c0)=0x1, 0x4) 03:33:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="f4312014dbb999e0f081990d7fa33b6a4a49c6edef80d75f370f382bb62209954a98ba0ec854e10ed27bc8fc7f4a73409aada32cf8830e6c40fef8c8a5f5f75f0855a2ef4dbe4d006c921c45a2f0befbfa68989e3d2abda2db1e7cd5ef4d54dadc33cfe1d470d16f5d0220641accfb55c49b4665f1b333149a2c83c8b46f93ba7ceb826170efb0ea9dee29849fcececc59ca328e2bf5b9f224d2ff6f955b015d3c47aa6d18cf1cdaf0e23c62edb7d170aeba93945bb418cb0566d391ddf3f7bf267b3a34fe28d50c22a93a1184744288dd7b542a91939e89cb04757e246bc67f05e8731e", 0xe4}, {&(0x7f00000001c0)="f4028ecff1bf0c0e4e719ad1c2effde5b74fb95c5b67805ce93152f119a30a9dc1b6c740e90062a6714e9b389f6dcf8b983646ad9d92cc8eb96b98f23fbd11e98f37c4e00fda34838d60a4d45d15592dbc6305f9b148dbd096c484918095938a6a5e36b55c0031142ed37bd9be13aabd24dab8c1d460f7499eb497da4ebaccf8297411f5a8d657fbe379eb6fe069ae928e819ee9b0232734c1a1aee15f82f5a79a37dd0cdd87f4ca89", 0xa9}, {&(0x7f0000000040)="f90353d9498ead8213a4806cdf713d2b0b", 0x11}, {&(0x7f0000000280)}], 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000000001000007000000566b024f453f5bacfaaa7eaada177c7f9b19a40bfb552994293fbffba345d5a3b2c02ecf5968e765254eac068c0eb9a1c75fd70000000000880000000000000001000000ef00000030a6b1d37f54d3df47b4019bebf427e91c4ed0535c9713fdbec0169fe9b7564db5d738d7ef22c8f464b8ba0031237a37360b56ba82924392498972816a4a10b733bf206f80f025c612a17a523fadf6d13f44391f2d5f412c404872e4e8a47deae74793a16d04838eee4e20a89086d8bf8df1ed200595160960f38fb40000000000"], 0xd0}, 0x3ff}], 0x1, 0x4000000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000340)={0x100000000, 0x7}) sendto$inet6(r0, &(0x7f0000000480)="c2", 0x1, 0xfffffffffffffffd, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000280)="cc", 0x1, 0x11, 0x0, 0x0) 03:33:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000280)=""/146) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket(0x8, 0x1, 0x74) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000240)={0x100, 0x3, 0x3f}) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) syz_open_dev$rtc(0x0, 0x0, 0x100) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="fec13c7797ad31a1ffe9b031ac6a1c6035f486c767eace5750aede3f6b90a7cf4d11e0f0c70d2d63da02630119fb1bbf004d11824f35aca93a740fef7c4c17d4704e6862f36d69aa059c8f90f9b28516bfb907063bf2513e3a0e7de3a239503c50e1299624054dd03a810a22775d211f46d06fc90cf5adfde15b79c76fd0986cd574f0b5dfedef72c84c4917d8162efa04578a8268a7b7f79ee7ecb0321d80f9e7c39c0faab8511d89e3eb32f960e169beec372a40433b96162c611b62618308bca521cfd47544b6dc00f932c38bae1799ffbab7cbb9eb364a7fe029c5a500") ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xfbe9) openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 03:33:57 executing program 2: setresuid(0x0, 0xee01, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') fstat(r0, &(0x7f0000000000)) 03:33:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDDISABIO(r0, 0x4b37) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) fcntl$setstatus(r2, 0x4, 0x8000000000044000) io_setup(0xb, &(0x7f0000000240)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) ptrace$getregset(0x4204, r4, 0x4, &(0x7f0000000380)={&(0x7f0000000300)=""/119, 0x77}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000000)) lstat(&(0x7f0000000080)='./bus\x00', &(0x7f0000000580)) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000200)={0x4, 0xd1, 0x7}) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000440)=0x1) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000, 0x407000}]) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f00000003c0)={0xffffffff, 0x8}) lseek(r2, 0x0, 0x4) r5 = getpid() ptrace$cont(0x1f, r5, 0xffff, 0x51e) syz_open_pts(r0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000400)=0x80, 0x4) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000040)={0x100000001, 0x0, 0x1}) 03:33:57 executing program 2: syz_emit_ethernet(0x1, &(0x7f00000002c0)=ANY=[@ANYRESOCT], 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaabaaabb01809bdfc200000108060001080006040002aaaaaaaaaaaa00800000b3031508d4dbac14140ce8f08333b6793d625c1e52a0c03a667bbaa719cba6108560fcea9d824d135b9b33af6475d8d2af3aadb7fa5e738e1cba4c0e7278545b3cb6071f3d37ed6e175ffcd78547b2a8d5c68b27c41351aee7f860998446956b88355129d9b06413da7e4b3c87a3af4d8c662ae3e0b022ab2aded2bf47306292903f396b73dcb1f419381b10a4db1c931d"], &(0x7f0000000080)={0x1, 0x3, [0x6ea, 0x96a, 0xfcf, 0xab7]}) socketpair(0x1, 0x3, 0x8000a, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x300, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0), 0x10) [ 396.821210] audit: type=1400 audit(2000000037.890:105): avc: denied { setopt } for pid=19224 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:33:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x2) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:33:58 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:58 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x402200, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r1}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000002c0)={@loopback}, &(0x7f00000003c0)=0x14) fsync(r0) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000280)={0x3, 0x1}) ioctl$int_in(r3, 0x5452, &(0x7f0000000580)=0xe2e) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x200000, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000, r1}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) ptrace$setregset(0x4205, r1, 0x0, 0x0) io_setup(0x0, 0x0) io_cancel(0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x20141042, 0x31fd770a371d706f) ftruncate(r5, 0x2007fff) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 03:33:58 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x20000000000004) socket$inet6(0xa, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x1, r1) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2349}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$sock_ifreq(r4, 0x899b, &(0x7f0000000240)={'syz_tun\x00', @ifru_names='veth1\x00'}) r7 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x110, 0xffffffffffffffff, 0x0) pwritev(r7, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f52db481db6", 0x31}], 0x1, 0x81806) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x7, 0x8d0}) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000380)) unlinkat(r2, &(0x7f00000003c0)='./file0\x00', 0x200) r8 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) getpeername$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) write$binfmt_elf64(r7, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x319) keyctl$unlink(0x9, r8, r8) sendfile(r2, r6, &(0x7f0000000300), 0x2000006) r9 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r8) r10 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r9) socket$netlink(0x10, 0x3, 0x1f) keyctl$revoke(0x3, r10) 03:33:58 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:58 executing program 0: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = dup(0xffffffffffffff9c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RTC_PIE_OFF(r0, 0x7006) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1bef) io_setup(0x0, &(0x7f0000000280)) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)) io_submit(0x0, 0x0, &(0x7f0000000a00)) exit(0x40000000000000) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x20) 03:33:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x24000, 0x80) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000008, 0x10, r2, 0x0) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:33:58 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0, 0x9, 0x8}, 0xc) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/user\x00', 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r2 = socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="10000200000000002000000000000000"], 0x1, 0x1) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="00000000c37c2291e60000fddbdf"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) r5 = syz_open_pts(0xffffffffffffffff, 0x185141) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000080)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x1c) perf_event_open(&(0x7f0000000740)={0x0, 0x70, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x101, 0x40000000004, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffe00, 0x0, 0x0, 0x100, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000700)}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x1}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@local, @empty, @mcast2, 0x0, 0x78}) r6 = socket$unix(0x1, 0x3, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) bind$unix(r6, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg(r7, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:58 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x8010, r2, 0x0) ioctl$void(r2, 0x5451) setsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000080), 0x3d3) 03:33:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz0\x00', {}, 0xfffffffffffffffd, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd08], [0x0, 0x0, 0x0, 0x0, 0x8000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}, 0x45c) r1 = getpgid(0x0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/user\x00') splice(r0, &(0x7f0000000240), r2, &(0x7f0000000280), 0x4, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffff9c, 0x5501, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000100)) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{0xfff, 0x0, 0x7f, 0x7}, 'syz0\x00', 0x15}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x7, 0xfffffffffffffffb, 0x6, 0x7, 0x0, 0xfffffffffffffff7, 0x20, 0x2, 0xfc, 0x737, 0x1, 0x3, 0x0, 0x73e, 0x12000000000, 0x4, 0x7ff, 0x9, 0x1, 0x63db092f, 0x419, 0x4, 0x0, 0x1ff, 0x40, 0xa00000000000000, 0x4, 0x200, 0xffffffffb61d8627, 0x5, 0x1000, 0xb3c, 0xe4b, 0xfffffffffffffffb, 0x3ff, 0x20, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2000, 0x9, 0x40, 0x6, 0x2, 0xfff, 0xfffffffffffffffc}, r1, 0xf, r3, 0x1) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000002c0)='syz0\x00') [ 397.602150] audit: type=1400 audit(2000000038.670:106): avc: denied { setopt } for pid=19278 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:33:58 executing program 4: lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f0000000100)='\x00', 0x11c, 0x1) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) readlinkat(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/252, 0xfc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00003e4000)={&(0x7f0000e87000), 0xc, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000012000902000000000000090000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000040012000000010000000000000000000000020008000a00", @ANYRES32=0xf], 0x2c}}, 0x0) 03:33:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1d4, r2, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x40, @ipv4={[], [], @rand_addr=0x58}, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x16}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf03}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa5f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7e802fde}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa00000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb920}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xab}]}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r3 = dup(r1) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="000000000000000000000000000000000000490000004cd4e7598e569330bcd0aa83663bbc4a0b26920c00000039ffeb1b161240d60bf70053bec210678dd730d8fbd5a12750c54c3d6c84b6c071279bb07e4004a55db512caae5c536bf8699bcc03821e9bbb0fbd59f123cac17149d10af301a99bdc5bf2f04e83e7bf07c5d0f23584008c7b23a9b541d04c2a0940caf45c5a1d76d05f6ebe38aadf92ac7e2080a821c84151d1f410f883b7d09194110fe10645d07067946d74f0972d5ced82322294832548861fe0b9e215c6cd0dd1c0e305d29081e14dccf906ad92d4d15d917d1e839c3a885278bfc7590fa8f366"], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1742911f) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f00000000c0), 0xfffffffffffffc72, 0xfffffffffffffffe) flistxattr(r3, &(0x7f00000008c0)=""/249, 0xf9) keyctl$setperm(0x5, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x37, 0x7fffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/validatetrans\x00', 0x1, 0x0) [ 397.703292] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 397.735481] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000002c0)) r1 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)=',\x00', &(0x7f0000000140)='+*\x85[,nodevlowlan1\x00', &(0x7f0000000200)='cgroup,usermime_type\x00'], 0xfffffffffffffffe) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 397.752574] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 397.762215] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:58 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000180)=0x80) unshare(0x400) fchdir(r0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) 03:33:59 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x402200, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r1}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000002c0)={@loopback}, &(0x7f00000003c0)=0x14) fsync(r0) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000280)={0x3, 0x1}) ioctl$int_in(r3, 0x5452, &(0x7f0000000580)=0xe2e) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x200000, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000, r1}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) ptrace$setregset(0x4205, r1, 0x0, 0x0) io_setup(0x0, 0x0) io_cancel(0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x20141042, 0x31fd770a371d706f) ftruncate(r5, 0x2007fff) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 03:33:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) accept$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x34, &(0x7f0000000000), 0x4) 03:33:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1d4, r2, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x40, @ipv4={[], [], @rand_addr=0x58}, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x16}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf03}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa5f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7e802fde}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa00000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb920}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xab}]}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r3 = dup(r1) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="000000000000000000000000000000000000490000004cd4e7598e569330bcd0aa83663bbc4a0b26920c00000039ffeb1b161240d60bf70053bec210678dd730d8fbd5a12750c54c3d6c84b6c071279bb07e4004a55db512caae5c536bf8699bcc03821e9bbb0fbd59f123cac17149d10af301a99bdc5bf2f04e83e7bf07c5d0f23584008c7b23a9b541d04c2a0940caf45c5a1d76d05f6ebe38aadf92ac7e2080a821c84151d1f410f883b7d09194110fe10645d07067946d74f0972d5ced82322294832548861fe0b9e215c6cd0dd1c0e305d29081e14dccf906ad92d4d15d917d1e839c3a885278bfc7590fa8f366"], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1742911f) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f00000000c0), 0xfffffffffffffc72, 0xfffffffffffffffe) flistxattr(r3, &(0x7f00000008c0)=""/249, 0xf9) keyctl$setperm(0x5, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x37, 0x7fffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/validatetrans\x00', 0x1, 0x0) 03:33:59 executing program 0: syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x109040) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) getpid() r2 = socket$netlink(0x10, 0x3, 0xa) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r3, 0x2007fff) shutdown(r0, 0x0) flistxattr(r2, &(0x7f0000000140)=""/174, 0xae) sendfile(r1, r3, 0x0, 0x8000fffffffe) lsetxattr$trusted_overlay_opaque(&(0x7f0000000700)='./bus/../file0\x00', &(0x7f0000000740)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2) io_submit(0x0, 0x3, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0xabb6, 0x0, 0x0, r0}, 0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, r0}]) r4 = geteuid() setuid(r4) io_setup(0x4, &(0x7f0000000240)=0x0) io_cancel(r5, 0x0, &(0x7f0000000200)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ftruncate(r0, 0x4820f) 03:33:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:33:59 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:33:59 executing program 4: set_thread_area(&(0x7f0000000000)={0xecd5, 0xffffffffffffffff, 0x400, 0x4, 0x1e1, 0xf71, 0x7, 0x7, 0x53a, 0x80}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={&(0x7f000034c000), 0xc, &(0x7f00000daff0)={&(0x7f000017e000)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}, 0xffffffffffffff63}}]}, 0x13c}}, 0x0) 03:33:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) rt_sigprocmask(0x2, &(0x7f0000000000)={0xff}, &(0x7f0000000040), 0x8) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x20000054, &(0x7f0000000040)}, 0x4) signalfd(r0, &(0x7f0000000080)={0xce}, 0x8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x7, 0xcb8, 0x9, 0xc1b3}, {0x8, 0x6, 0x400, 0x5598}, {0x6, 0xfffffffffffffffd, 0x5}]}) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f00000002c0), 0x4) listxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/107, 0x6b) [ 398.277833] audit: type=1400 audit(2000000039.340:107): avc: denied { getattr } for pid=19322 comm="syz-executor0" name="NETLINK" dev="sockfs" ino=46232 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 03:33:59 executing program 4: r0 = socket(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) getsockopt$inet_int(r0, 0x0, 0x400000000000e, 0x0, &(0x7f0000000100)=0x39f) [ 398.386010] audit: type=1400 audit(2000000039.380:108): avc: denied { write } for pid=19322 comm="syz-executor0" path="socket:[46232]" dev="sockfs" ino=46232 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 03:33:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x3fffffffffffdd0, 0x0, 0x0) write(r1, &(0x7f0000000040)="f8", 0x1) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)='#', 0x1}], 0x1}}], 0x1, 0x0) close(r0) 03:33:59 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x0) sendfile(r1, r1, &(0x7f0000000480), 0xa198) 03:33:59 executing program 0: r0 = socket(0x4010, 0x3, 0x200000000) write(r0, &(0x7f00000001c0)="240000001a002501000000000000001c020b5aff6e10b500000780cc080002004ab4ac14", 0x382) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$cont(0x9, r1, 0x0, 0x5) fcntl$lock(r0, 0x24, &(0x7f0000000040)={0x101, 0x5, 0x4, 0x4, r1}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_INPUT2(r2, &(0x7f0000000200)={0xc, 0x1000, "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"}, 0x1006) 03:34:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f00000009c0)={0xa, 0x4e24, 0x2, @local, 0x3}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x73a}, 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x27f}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000640)="b1", 0x1}], 0x1}, 0x0) 03:34:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x14c) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000280)=@v3, 0x18, 0x0) keyctl$session_to_parent(0x12) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0x79) 03:34:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="f0000000100001000000000000000000ff010000000000000000000000000001ff01000000000000000000000000000100000000000000000000a00000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffff7f0000010000000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000a0000000000000000000000"], 0xf0}}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x5, 0x9, 0xba32, 0xcb3, 0x469}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x102, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getpeername$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x10c, r2, 0x200, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x1}, 0x800) 03:34:00 executing program 5: r0 = socket(0xa, 0xf, 0x0) socket(0xc, 0x0, 0xffff) getsockopt$inet_int(r0, 0x0, 0x37, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_TSC(0x1a, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$smack_current(r1, &(0x7f0000000080)='\x00', 0x1) write(r0, &(0x7f0000000380)="130000001000ffdde200f49ff60f050000230a", 0x13) 03:34:00 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, 0x0, 0x0) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:00 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x22000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000400}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x258, r3, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'yam0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @mcast2, 0x5}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1265}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff73}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}]}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x783}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2d9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x40}, 0x80) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, r4, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)={0x0, 0x0}) rt_sigqueueinfo(r6, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 03:34:00 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x8060, 0x110) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x3) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x952d5d9, 0x4, 0x1}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 03:34:00 executing program 5: connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000200)=@vsock, &(0x7f0000000180)=0x80) accept4$inet(r0, 0x0, 0x0, 0x1800) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x10, r0, 0x0) tee(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) socket(0x0, 0xe, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x430000) recvmmsg(r2, 0x0, 0x0, 0x10102, &(0x7f0000009440)) r4 = dup(r2) ioctl$TIOCEXCL(r3, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r4, &(0x7f0000009f80)=[{{0x0, 0x0, &(0x7f0000009c40)=[{&(0x7f0000009500)=""/136, 0x88}, {&(0x7f00000095c0)=""/170, 0xaa}, {0x0}, {0x0}, {&(0x7f0000009880)=""/183, 0xb7}, {&(0x7f0000009940)=""/242, 0xf2}, {&(0x7f0000009a40)=""/213, 0xd5}], 0x7, &(0x7f0000009cc0)=""/26, 0x1a, 0x100000001}, 0x6}], 0x1, 0x20, &(0x7f000000a040)) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) lseek(r1, 0x0, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f0000003200)={'icmp\x00'}, &(0x7f0000008d80)=0x1e) prctl$PR_GET_NO_NEW_PRIVS(0x27) ftruncate(r5, 0x80003) sendfile(r2, r5, &(0x7f00000000c0), 0x8000fffffffe) recvmmsg(r3, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 03:34:00 executing program 0: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x1, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1f"], 0x0, 0x0, 0x0}) r4 = accept$packet(r1, 0x0, &(0x7f0000000400)=0x9f) fsetxattr(r4, &(0x7f0000000040)=@known='trusted.overlay.impure\x00', &(0x7f0000000080)=')\x00', 0x2, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSMRU1(r5, 0x40047452, &(0x7f0000000100)=0xfffffffffffffffb) getsockopt$inet6_mreq(r6, 0x29, 0x0, &(0x7f0000000280)={@dev, 0x0}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000380)={@multicast1, @empty}, &(0x7f0000000440)=0xc) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f0000000300)={r7, 0x1, 0x6, @random="2605a892e770"}, 0x10) r8 = socket(0x4200000000010, 0x2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) write(r8, &(0x7f0000000140)="3ffbdf3b135b413beaf9800800120000000108000000000180000000000000000000000000127033849af5d35e23b90d2f848443902fc5309326278f0bbf6dc79e7c4584fec774c511811f796500d20473219d3d8d7d77f92c354955795a8806000000000000002f1ffb6818edbdc76474ca182c2cdee0ffcec425c4e8c6487c6c8ae41e47385ff6c394d40ff28acbc3f7e7fc2e8c82f0dedbf42d1177924b2371b519be86c8dd76dee8fbf31b93317fa16073ddbd8ebc093868134500000000000000000000", 0xc) ioctl$EXT4_IOC_GROUP_ADD(r8, 0x40286608, &(0x7f0000000240)={0xef, 0x5, 0x7f, 0x5, 0x3, 0xffffffff}) 03:34:00 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/39) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000000080)=""/183, 0xb7, 0x10000, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @mcast2, 0x1ff}, 0x1c) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) close(r1) 03:34:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000540)='./file0\x00', 0x6) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000280)="c03d9361b1d2c712df05a5e2f7da533ffde9ae0aca4360d0485416a52b88eda1e37c2cc4b56a355bc4c01c794e68e5818c19ef710b889b45bee78ad868784bc7a655200e51fa99dacd3c622ac69cf24ed4f7ec20073396d8f1fd1147131e81fbfb22929c6b9477c7aa2f6cbefe093c12795afeeb4d428046ed860f7b8f2ce7d456aaf1d9a80a2ca5493159a730275f17d9dba3e0a8d5c3510c7db54c75a706c9ad5485316b271e4d18", 0xa9, 0xfffffffffffffff8) r4 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r3, &(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x0}, r4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000003c0)=ANY=[@ANYBLOB="0180e0000000aaaaaaaaaa0086dd606b976fd7aebdf5648002040000000000000000000400bbff020000000000000000000000000001fff500000041089078ed23bd6d9ed7687aa114370fc7cb34d9eb37feeae6db299c10109e24074cf9c01aafd1493517f4ded0dfa3d0fd564b0a85923766c86822fa9f9f184d68b7b2edd787e3d0a5534e2ac0471b4eebce4bd8776187bac1aae8e636e3c8fdf928da002d7b6605c12e9254b39a41b79bdd057bf61b2b2b672eced64114dcc69f40a95d769838b941f5e9487ac4c7dd88cbf5d0343581294d11ec8b9d"], 0x0) r6 = socket(0x200000000000011, 0x3, 0x0) fchdir(r6) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'ip6_vti0\x00', 0x0}) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$FICLONERANGE(r6, 0x4020940d, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}) perf_event_open(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x8, 0x800, 0x0, 0x0, 0x6c, 0x2000, 0x8, 0x9, 0x0, 0x802e, 0x81, 0x4, 0x5, 0x7, 0xea, 0x0, 0x604, 0x8, 0x4, 0x10000, 0x9, 0x100000001, 0xeea9, 0xd3f, 0xfff, 0x400, 0xfffffffffffffc01, 0xf4, 0x5, 0x9, 0x80000001, 0x0, 0x7756, 0x1, 0xa5, 0x0, 0x7, 0x2, @perf_config_ext, 0x5820, 0xffbb68f, 0x80, 0x6, 0x8, 0x2}, 0x0, 0x7, r8, 0x1) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x50, r5, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000680)=0x4) lremovexattr(0x0, &(0x7f0000000640)=@known='trusted.overlay.origin\x00') geteuid() r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000940)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000900)={&(0x7f0000000740)={0x1ac, r9, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc0c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa5}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffc01}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x57}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xee}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2c28}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2e95}]}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r6, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r6, 0x5411, &(0x7f00000005c0)) clock_getres(0x7, &(0x7f0000000580)) sendmmsg(r6, &(0x7f0000000d00), 0x400004e, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) 03:34:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000001000)) clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', r2}) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) 03:34:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x16}]}, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000003b40)=0x4, 0x4) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000003a00)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000039c0)={&(0x7f0000000600)=@bridge_getneigh={0x20}, 0x20}}, 0x0) r2 = getpgid(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x4, 0x616, 0xff, 0x3, 0x0, 0x5, 0x8, 0x3, 0x5, 0x9a, 0x6, 0x2, 0x1, 0x4, 0xfff, 0x7, 0x850, 0x0, 0x4, 0x0, 0x40, 0x8, 0x1000, 0xd2c4, 0x4, 0x7f, 0x8, 0x8, 0x0, 0x7ff, 0xff, 0x9, 0x8, 0x101, 0x889, 0x40, 0x0, 0x8, 0x0, @perf_config_ext={0x817a, 0x6}, 0x4, 0xfff, 0x8b, 0x3, 0x81, 0x3, 0x4}, r2, 0x10, r3, 0x9) 03:34:00 executing program 5: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(r0, 0x8, r1) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000340)={'HL\x00'}, &(0x7f00000003c0)=0x1e) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x40000, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000280)={0x86, &(0x7f0000000200)}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x1) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000140)={0x3, 0x4, 0x10000, 0x5}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x46) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0xfffffd69) socket$inet6(0xa, 0x80a, 0x5f7a) listen(r4, 0x80001000) socket$inet6_tcp(0xa, 0x1, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "356251df13dbdbb1ec35c87951367b36"}, 0x11, 0x2) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x7, 0x4, 0x0, 0x10001, 0x0, r4}, 0x2c) dup3(0xffffffffffffffff, r5, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x2, &(0x7f0000001fd8)=@raw=[@map], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:34:00 executing program 2: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) mmap(&(0x7f0000ff2000/0xb000)=nil, 0xb000, 0x8, 0x80011, r0, 0x0) lseek(r0, 0xfffffffffffffffc, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xfffffffffffffffd, 0x7fc) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = dup2(r1, r0) ioctl$TIOCSTI(r2, 0x5412, 0x3) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 03:34:00 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180), 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ioctl$void(r0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:00 executing program 0: inotify_init() prctl$PR_GET_SECCOMP(0x15) r0 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffffc) prctl$PR_GET_SECCOMP(0x15) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000180)=0x10) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000001c0)={'bridge0\x00', {0x2, 0x4e23, @broadcast}}) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)='\x00') 03:34:00 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000001cc0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64], @ANYRES16, @ANYRESOCT], @ANYRES16, @ANYPTR=&(0x7f0000001b80)=ANY=[@ANYRESDEC, @ANYRESOCT=0x0, @ANYRESOCT, @ANYPTR=&(0x7f0000000980)=ANY=[@ANYBLOB="44773439a033607b5adc30091e4390701bad48947d2d8d387e4770de9e898f17cf09551e3efcca433ca48bca34fea0f7c14731f8e97107d6dede85e7945ba7c41e92816a0b240a7aca1d7a2fdebe3cb6c244e92240138041179b827de690d1be8e6f25f02f0b0d6bd8f53c35433f4f126c2f2f24ef09a37d715743ac204addc3ae2cb3463d9815b29b8f6b6220c9", @ANYPTR64, @ANYPTR64, @ANYRESHEX, @ANYBLOB="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", @ANYBLOB="a88ca4b8494928d285fe738f20dea869b14610982c3f196bd8a78b84bf4c41b5b2cb15e0a7ed2591bae6f87ecfbf8bca3039d66719cdb6e88ae61a9054e6a8b0869a428a97eb153769701be6ce28bfeaab20a533ac3389808f8201227e372adebb56c74085517b8169aa89fd130e13716a0631234ee14f1add57f2ec7ede4acc9a74479d9c829e68118326fac493bcf1a15e04a8019a8ea66d5ef391250835dad1c32fafece9aabfd42401e451208adf630dd806fb66b2bfe92f15cd946478b08180bbe8", @ANYRESOCT, @ANYBLOB="559c37a953b48cf19ba4fe8f86a802370c32b027a9bcc3de3a4c0755fdbf66726e764bddb3c72b41779770d56eca593981", @ANYRES64, @ANYRES64=0x0], @ANYBLOB="1787be6a6c4d1c132da2ee0010ffde0ca41fb1bcd816159743bedbedbcdb58ccd0d01b8f43bf4fd637fe560b9f69bc2d52d6d7a7a1a9db86169ad7404c3e12b150314bd5d20e790f7413498adf0260ad9644d982b8b905db9c677448223fce0002cdd7f30424059a98bef72c59785f62357e5d077814cf6c79ec5642b9fa8d21e38b90cb9c6d6d10e9150c7d35c8548a2ddbbe89c3e55d3cfc320484416ce49819b2cf04722c5b3ec384882e110ecbeb369ec2fb205b43a8d74148e6c863422625969d729278db8316af25aa0b19c014ba04d7ceedce6bdbdfba5f6ff26ab3da5e124f7d568fd1256a"], @ANYBLOB="f08259d1a39f7ecee37a2dd83e0454a867f49afe68b71a1e1a81025c7ecf5e2dc82fc8bb2c6779d3f76c19d54f36df13b1a1c7618c1ae4649bfb198d0178c63f71e826a62474f1c5bbfc7aaf0e5e1f341ea3548bcb7e61c3c17d56a14417df1ee9116197dcdd2eb610729379d41da0ed43284b887f1b434c11d898ae444eae84e04f7ee86bdb746378c47147504a8a0d0c016685f3f06555", @ANYRES16, @ANYBLOB="2ca9d2c7440a6e71aa5cf05415c170af4f08ccb36ac2964cd96f910d1c26a852aab8eea06e"], 0xd1) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x90000, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) setsockopt$packet_buf(r3, 0x107, 0x5, &(0x7f0000000680)="4cdd9d89a7000000a2351c22aca8a0254ecd86c7c6cf314f0ceafc", 0x1b) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000500)=[{0xff, 0xffffffffffffff17}, {0x100, 0x7}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000300)={'rose0\x00', {0x2, 0x4e24, @multicast2}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) recvfrom$inet6(r4, &(0x7f0000000780)=""/67, 0x2914109394d9b8e, 0x517c3a3b6e4a8afb, &(0x7f0000000240)={0xa, 0x4e21, 0x4, @loopback, 0xd71}, 0x1c) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f00000002c0)={0x17, 0x9e, &(0x7f00000008c0)="8b557c582cfa47f9e605ea762ba915a9e527e23cbc39cd128260e6dec24ac1a1bc78398341176153242d34b2049217d3555b8e0414e86c264e7a748ed0d3cb61e889fcb775bb0b0c1b066c48d271b713d686f16473095fb8dd88afaeff343078cb2f3f93e3b0999aa049bf53ceb5c47857668470efb60f18d1cbabbd11321b81e0d3a06354126a0c2f08eabab2c74995e46b851c85915f1bdaa4000af748"}) accept4$inet(r3, 0x0, &(0x7f0000000280), 0x800) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0xffff, {{0xa, 0x4e23, 0xc15c, @remote, 0x2}}}, 0x88) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'bridge_slave_1\x00', 0x4}, 0x18) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r7) prlimit64(r5, 0x0, &(0x7f00000001c0)={0x0, 0x380000000000}, &(0x7f0000000200)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) accept(r8, &(0x7f0000000540)=@in, &(0x7f00000003c0)=0x80) r9 = creat(&(0x7f0000000800)='./bus\x00', 0x200000000008000) clone(0x10002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r9, 0x40286608, &(0x7f00000000c0)={0x10}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000400)={0xac0, 0x7fff, 0x6, 0x4, 0x2, 0x3, 0x7, 0x2, 0x3, 0xfff, 0x1}) ptrace$getregs(0xc, r5, 0x2, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) 03:34:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind(r0, &(0x7f0000000000)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) prctl$PR_GET_THP_DISABLE(0x2a) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) read(r0, &(0x7f0000000080)=""/209, 0xd1) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x400) fcntl$setflags(r0, 0x2, 0x1) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffb000/0x4000)=nil) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x972, 0x8000) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000200)=""/184) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f0000000300)={0x21, 0x1}) fallocate(r1, 0x0, 0x9, 0x20) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000340)) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000380)=""/209) setsockopt$inet6_tcp_buf(r2, 0x6, 0x21, &(0x7f0000000480)="1b4ba6a119bcb3e43d1802091270f299f1052045d38b266cb9dbc9de55a0b8eccecb03317d5022fc5b823c526854f5278c3d9efbc595daea23410d19588447623e8d4d311cc5de37f44ed737b624237c49f569405e33", 0x56) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x3000)=nil) lgetxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000580)=""/21, 0x15) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000640)=[{{}, 0x1, 0x6, 0x8}, {{0x77359400}, 0x17, 0x0, 0x4}, {{0x0, 0x2710}, 0x17, 0x100000001, 0x95}, {{0x0, 0x2710}, 0x17, 0x7ed8, 0x7fffffff}, {{r3, r4/1000+10000}, 0x16, 0x7fffffff, 0x9}, {{r5, r6/1000+30000}, 0x4, 0x1, 0x4}, {{0x77359400}, 0x1, 0x0, 0x60}], 0xa8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xdc5e) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000700)) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000780)) write$smack_current(r2, &(0x7f00000007c0)='\xad\x00', 0x2) ioctl$VT_DISALLOCATE(r7, 0x5608) r8 = getpgrp(0x0) syz_open_procfs(r8, &(0x7f0000000800)='sched\x00') ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000840)) 03:34:01 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5dd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000002c0)={'broute\x00', 0x0, 0x3, 0xbe, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/190}, &(0x7f0000000080)=0x78) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCSPGRP(r1, 0x8902, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffc}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xfffffffffffffffc}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) 03:34:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) r3 = accept4(r0, &(0x7f0000000400)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000480)=0x80, 0x800) getsockopt$packet_int(r3, 0x107, 0x13, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0x4, 0x4, 0x80000, 0x80000000000}, 0x2c) r0 = add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="7a25e12de1333bab43bbbb30d01b85694e744372bb718436e55ab6e90f4b9ecfc675a4a93c58c55bf206cfc78e38ce89c1723882ceaf3c336fe4d880adcb7ca8b43fef41b16ec71321da5fc9a11fe63ef93f252a3723c9b2a56dd145ddc310e8bcb1145133d33e032ecf05afb89a5236d005ff95618e0b7c625ec407a8a7fb1b2770d1c63801b6e97781f0b09b281300935d5044f852e956488a45a61a93afe14441da6545b8589167d102e91ec764e91ef6c54d938e533d917c9d223a553a0d3554323e306e6b7dde138c4bb88e135866ad7e3610f63b29ed2816666e", 0xdd, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r1 = getpid() r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x8, 0x1, 0x640, 0x0, 0x1f, 0x1000, 0x8, 0x2, 0xfffffffffffffff8, 0x0, 0x5, 0x124, 0x9, 0x9, 0xdf, 0x9, 0x9, 0x8000, 0x3, 0xffff, 0x3ff, 0x3, 0x100, 0x9, 0x7606, 0x9, 0x2, 0x401, 0x7, 0x81, 0x8, 0x3ff, 0x4, 0x45, 0x3, 0x0, 0x4000000000, 0x1, @perf_config_ext={0x7, 0x5}, 0x0, 0x2, 0x3ff, 0x699dd6d4c0641366, 0x7, 0x4, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffff9c, 0x2) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x8, 0x40, 0x8, 0x8cf, 0x0, 0x7, 0x10000, 0x2, 0x1, 0x1f, 0xc1d8, 0xffffffff, 0x401, 0x101, 0x7, 0x6, 0x74, 0xe67, 0x9, 0x2, 0x9, 0x0, 0x1, 0x809, 0x0, 0x9, 0x33fb955b, 0x2, 0x4, 0x4, 0xe38, 0x81, 0x100000000, 0x7, 0x8000, 0x7, 0x0, 0x1, 0x7, @perf_bp={&(0x7f0000000000), 0x2}, 0x4000, 0x5, 0x3, 0xf, 0xb107, 0x3d, 0x1}, r1, 0x10, r2, 0x9) 03:34:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000180)="4fa67bb7dfca444ac4eb1ec430852fb4777964ec17d8ec3deac085812c1b14750569cc7e8f39addc7cd39274088e7c2ab0271fb52720c4d89ae74184b6392e4c6eb161612d776e601cdda7e50d045b9bdc536cd4c54309be0b0f12cffe89efb5018db055c9d227176215348b084009b3d0e80ad29ef8000000") ptrace$cont(0x1f, r2, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x1}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000200)) 03:34:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x4) 03:34:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000240)}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'teql0\x00', 0x1000001}) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x400015) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) 03:34:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010407031dfffd946fa283000a200a0009000100021d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 03:34:01 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x8000001000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_bp={0x0}, 0x0, 0xffffbfffffffff58, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) syz_open_pts(r0, 0x4) write$binfmt_aout(r1, &(0x7f00000000c0)={{0x0, 0x1, 0x1000, 0x22e, 0x18f, 0x9a35, 0x161, 0x5}, "8657672d9c9b8f202d1bd52550e06e99a0b185ec8cd0665f0f139ff1c5bfd7ff0747cf3daaf777889b781e4ee3cadc3cf4d6921f7982707e37d1b5bf5046437551a52ec979eb8655a29ecaa754aebbf99001ee643277486978252bb5c5a573bde7a7c3c4fa3497692a955e5fd3e5c7c015e537ffb70baa6d9ea6697f2408d8d17ed564939049a08ca04a02"}, 0xab) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfffffe9d) 03:34:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) fcntl$setown(r0, 0x8, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1b) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 03:34:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {}, 0x2a0}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={0x0, {}, {0x2, 0x0, @remote}, {}, 0xab852ebbeefbd631}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x3, 0x3, 0x7, 0x8000, 0x0, 0x401, 0x4908, 0xc, 0x7, 0x4, 0x7, 0x9, 0x6, 0x3, 0x80000000, 0x8, 0x5, 0x40, 0x3, 0x8, 0xff, 0x400, 0xf95, 0x4, 0x3, 0x4, 0x3, 0x1, 0x5, 0x100000000, 0x20, 0x0, 0x5fecaa74, 0x8, 0x100000000, 0x7fff, 0x0, 0x1, 0x2, @perf_config_ext={0x6, 0x5}, 0x4, 0x50f1, 0x81, 0x1, 0x401, 0x9}, r1, 0x4, r2, 0x4) 03:34:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r3, 0x4, 0x2800) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}, 0x10) r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000840)=0x80000000) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000000)={0x7, 0x100, 0x1d3d7812, 0x873}) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)='}]system\x00', 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000d40)='\x00*\xe1^T_\xbfWh\x18\xc1 \f%e\xb1\xb1W\"L\xfb3\x9e\x0f*\xbao\x8d(\x10\xfe\xab!\xbe\x11\x04\x06lQ\x9b\n\xe7XT\xdac\xe3\xf0\xa7\xf0\x94\xb4W\xe4^\x01C\v\x1f\x94\x7f\x85\xc0t\nS\x96\x9c\xaf\x98\xa8\x8c\x1e\xb6\x13\xba6p\xac\xdd*\x7f\xee\x06\x00\x00\x00\xfa\x1c\xb9B\xa3\x9eW+\x8d\xd6\xde\xb9\xa0\xf3\xa8\xd0\x84\x06\xbb\xc1\xb9\x98z\x88\xd9\xe2)\xb6V\x9d\t\x00\x00N\t\xbe\x19\f\xf2\xb4~s\xb2\xe0\xaf\xb7\x8c\xf6\x10D\x84[\xe3\xf5\x1f\x0f \xed\x1c\t\xe4\xc7\xaf\xe6g\x05l\xb5\xd6 \xa0\xf4\xf9U\xaf\x8c\x1e\xc5k \xcd\x98\x90H\xbc\xe3\x99\xff\xff\xff\x7fJ\xf6\x84\xc8~:\xce\xa6\x8cj1\xd1\x81I@\x99\x00\xa2\xe9:\xfc\x10z\xc4W\x90\x18%;\x8d\xe3\x90\x84\xe48\xf7\xca\x8cz\b\xaaN\x06\xe6\x9a\xd7\x1e\xa0\xf1\xd4\'\xf5\x9a\xf3W[\x8d?p\xdf\x98\xf9c\xbcN\xc7\x0f&\x1c\xbf\xfbU\x1a\xc0i!O\xa3\xbc\x1f>\aFS\xd1cd\xe1\xa5Y\x8e\x88A\xd0\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00V\xda\xac\xdd\xf3\xb1#\x1c\x85\x1f\x837\xfc\xd6S\xfe\x8c\xb6u\xc9\x97\x10\x01\x05x\xd6\xb7\x9b\x94Y\xe1\x99\xb8\xd1\xf2G\x9dP\xe4\xb8{\xc1`\xcc\xcb4\x95') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r1, 0x0, 0x3, 0x4, 0x72c7}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x80000001, 0x80, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3b9, 0x0, 0x0, 0x9, 0x1}, 0x0, 0xe, r5, 0x0) sendmmsg(r3, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x1, 0x0) r6 = open(&(0x7f0000000140)='./file0\x00', 0x8000, 0x100) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r7, 0x0, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x46}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}]}, 0x44}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000000c0)={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, 0xc) 03:34:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) connect$netlink(r1, &(0x7f0000000100)=@unspec, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000340)) stat(0x0, &(0x7f0000000500)) fchown(r0, 0x0, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000700)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='xfs\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x5890, 0x0) 03:34:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'syzkaller1\x00', r1}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rfcomm\x00') setns(r3, 0x0) 03:34:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) fcntl$setown(r0, 0x8, r1) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:02 executing program 2: unshare(0x20003fd) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000200)=""/246, 0xf6) getdents(r0, 0x0, 0xfffffffffffffeb9) 03:34:02 executing program 5: getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) getpgid(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) eventfd(0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2100, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000100)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc) mount(&(0x7f0000000540)=ANY=[], &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd98, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x400, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x6, 0x0, 0x0, 0x6, 0x4, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000500)='./file0//ile0\x00', &(0x7f0000000540)) getgroups(0x6, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, 0x0, 0xee00, 0xee01, 0x0]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000680)=0xc) getresgid(&(0x7f00000006c0)=0x0, &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) setregid(r4, r5) rmdir(&(0x7f0000000240)='./file0//ile0\x00') chdir(&(0x7f0000000340)='./file1\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) eventfd2(0x10001, 0x0) creat(&(0x7f0000000440)='./file1\x00', 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000480)) 03:34:02 executing program 0: readlink(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000003a000503000000000000000000000000"], 0x14}}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) 03:34:02 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_sa2={0x2, 0x13, 0xa52, 0x0, 0x0, 0x70bd26, 0x3506}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 03:34:02 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:02 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGREP(r1, 0x40047440, 0x0) 03:34:02 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "f90fac58ceda3e6f23cb9dfe7b005d99a3b10e96d2e1ea4c1fcfa8f43de913acaa6afcd7730c8318be71c32ac01b3bae6524b1e1fdef902197cf5b03526fc013a957f6a5a2841f2b4022980d0a4e7b73d7c62cef8264364267585e05214cff7c6d6f4904762b3957a8252a"}, 0x6f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x9e, &(0x7f0000000380), &(0x7f00000001c0)=""/158}, 0xde) 03:34:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffb4, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:02 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000440)=0x1) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0x200000010) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000ec0)={{{@in, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) lstat(&(0x7f0000000fc0)='./bus\x00', &(0x7f0000001000)) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x4000)=nil) sendmsg$unix(r3, &(0x7f0000001100)={&(0x7f0000000780)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000d80)}], 0x1, 0x0, 0x0, 0x4011}, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000380)) getpgid(0xffffffffffffffff) signalfd4(r1, &(0x7f0000000480)={0x5}, 0x8, 0x800) fstat(r3, &(0x7f0000000640)) add_key(&(0x7f0000000180)='id_resOlver\x00', &(0x7f0000000740)={'syz', 0x2}, &(0x7f0000000700)="d4a23bc594cb53d0599b4d17b284ba26ac930c6f4461ec07ab5d5e59e9214b05e969", 0x22, 0xffffffffffffffff) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000280)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_bond\x00'}) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000001240)='/selinux/create\x00', 0x2, 0x0) 03:34:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000001c0)={0x5, 0x9, 0x4, 0x8}) ioctl$TCSBRKP(r2, 0x5425, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r3, r4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) prlimit64(r1, 0xc, &(0x7f0000000200)={0xff, 0x9}, &(0x7f0000000240)) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000180)) 03:34:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x480, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x802, 0x0) rt_sigsuspend(&(0x7f00000001c0), 0x8) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) mlockall(0x6) ftruncate(r0, 0x6) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/75) r3 = open(&(0x7f0000000780)='./bus\x00', 0x8000014103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) read(r3, &(0x7f0000000200)=""/19, 0x93fa513f) 03:34:02 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000440)=0x1) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0x200000010) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000ec0)={{{@in, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) lstat(&(0x7f0000000fc0)='./bus\x00', &(0x7f0000001000)) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x4000)=nil) sendmsg$unix(r3, &(0x7f0000001100)={&(0x7f0000000780)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000d80)}], 0x1, 0x0, 0x0, 0x4011}, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000380)) getpgid(0xffffffffffffffff) signalfd4(r1, &(0x7f0000000480)={0x5}, 0x8, 0x800) fstat(r3, &(0x7f0000000640)) add_key(&(0x7f0000000180)='id_resOlver\x00', &(0x7f0000000740)={'syz', 0x2}, &(0x7f0000000700)="d4a23bc594cb53d0599b4d17b284ba26ac930c6f4461ec07ab5d5e59e9214b05e969", 0x22, 0xffffffffffffffff) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000280)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_bond\x00'}) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000001240)='/selinux/create\x00', 0x2, 0x0) 03:34:02 executing program 0: r0 = inotify_init() inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x1, 0x228be552}, 0xb) pipe(&(0x7f0000000180)) clock_gettime(0x0, &(0x7f00000001c0)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 401.745826] audit: type=1400 audit(2000000042.810:109): avc: denied { getrlimit } for pid=19582 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 03:34:02 executing program 4: setpriority(0x0, 0x0, 0x80000001) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x7ff, 0x8, 0x4}) 03:34:03 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:34:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2e) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(r0, 0xc) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x39}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) exit_group(0x0) 03:34:03 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2e) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(r0, 0xc) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x39}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) exit_group(0x0) 03:34:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f0000000080), 0x80000006, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 402.675078] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 402.675078] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 402.675078] [ 402.718489] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 402.776265] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 402.776265] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 402.776265] [ 402.795632] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ptrace$setsig(0x4203, r1, 0x6, &(0x7f0000000180)={0xa, 0x6, 0xbf36}) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:04 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x800100000003) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000500)=ANY=[@ANYBLOB="feffffff000000000a004e2100000000fe880000000000000000000000000001000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000040000000a004e20fffffffffe8800000000000000000000000000010000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e219c000000ff01000000000000000000000000000102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000a004e220000008000000000000000000000000000000001b100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2203000000fe80000000000000000000000000000be3aa000000000000000000000000000000000000008c3d373a0e2376a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055c93dbf7a8d2cd4ec7833d4788b900000000000000000000000000000000000000000000000000000000000"], 0x290) 03:34:04 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2e) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(r0, 0xc) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x39}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) exit_group(0x0) 03:34:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffb4, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:04 executing program 0: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xff80}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0xa}, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000280)={@rand_addr, @initdev, @loopback}, &(0x7f00000002c0)=0xc) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x4402, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000240)=0x3) ppoll(&(0x7f0000000040)=[{r0}, {r0, 0x8002}, {r0, 0x618}, {r0, 0x10}], 0x4, &(0x7f0000000100)={r1, r2+10000000}, &(0x7f00000001c0)={0x80000000}, 0x8) 03:34:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30000000010, &(0x7f0000000000)="0200000002b901b44893b924892b4400", 0x10) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000400)={0x4, 0xbe}, 0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)) r4 = getpgrp(0xffffffffffffffff) sched_setaffinity(r4, 0x1a2, &(0x7f0000000180)=0x4da) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000280)=0x0) capset(&(0x7f00000002c0)={0x20071026, r6}, &(0x7f0000000300)={0x2, 0xfffffffffffffffb, 0x2, 0x3f, 0x4, 0x9}) r7 = getpgrp(0x0) r8 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)="e015eeda786787831aa2170a39a4e72868d8eefd66990fe124a25f1b18ccf8b64564b2f64098609e3e0e2b8f513e23cc380133ba7b3a960b8a982809e0c9322606b3355c66027a99e9a0ae15cccc044e8ca0dd618872ee51b12b6c71d1eb753ca9220b10061deaa8e05bc43e44fff4842e19d48b3d73b4fca590d2198c6db85270cecd178c263c876c8a435717ff8525b1540ebaa2a6d91a9abe2cd1f9c4c98d05b5", 0xa2, 0xfffffffffffffffb) keyctl$invalidate(0x15, r8) capget(&(0x7f00000001c0)={0x20080522, r7}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r9 = dup(0xffffffffffffffff) fsync(r5) setsockopt$inet6_tcp_int(r9, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) 03:34:04 executing program 0: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) add_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x42242, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) getpid() ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000000c0)={0x0, 0x304, 0x100}) r5 = fcntl$getown(0xffffffffffffff9c, 0x9) getpgrp(r5) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f0000000040)) 03:34:04 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = creat(0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x20e, &(0x7f00000000c0)=0xd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x2ad, 0x400, 0x0, 0xf, 0x0, 0x0, "670008905ee6a4118b2755fd5c99af0db030ab6b35bd225f0b8ee9753a1a3efe5f383ef964f47d2b9bba0f480c0b756ec60715ef62467b4401495247e42152a0", "fb9a857f06f3c96f530f321ceed579899cc24613407879973bb26362527456d7e247d43c617c34f8fccee8b30cc83c3b5e01b1b22d95d86a916ded54d986eccf", "9856d8c7a51e082672013bd38ff7abfa8e47211a14275e510edec53bd8ff27e8", [0x81, 0x4]}) setsockopt$inet_mreq(r4, 0x0, 0x23, &(0x7f0000000480)={@remote, @broadcast}, 0x8) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) signalfd4(r5, &(0x7f00000001c0)={0x7}, 0x8, 0x800) ioctl$LOOP_CLR_FD(r3, 0x4c01) fcntl$setlease(r5, 0x400, 0x0) fsetxattr$security_smack_entry(r5, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000180)) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) syz_genetlink_get_family_id$tipc2(0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) recvfrom$inet6(r2, &(0x7f0000000240)=""/159, 0x9f, 0x0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="4a4a7b4cdb9a7aebd90c27b9e8c802040000000000008a7bb51b38"], 0x15) 03:34:04 executing program 4: openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) sched_setscheduler(0x0, 0x7, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x1, 0xfffffffffffffbf9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r1, 0x0, 0x40) fcntl$setsig(r0, 0xa, 0x20) r2 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 03:34:04 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r4 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r4, 0x7fff) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:04 executing program 2: pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000000c0), 0x1000001d1) tee(r2, r1, 0xfffffffffffffffd, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x18f040, 0x0) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000300)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') fcntl$getown(0xffffffffffffffff, 0x9) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000000c0)=0x3) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x4) rmdir(&(0x7f0000000580)='./bus\x00') ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f0000000b00)="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") r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) ioctl$VT_ACTIVATE(r5, 0x5606, 0xfffffffffffffffc) read(r0, &(0x7f0000000200)=""/250, 0x4ba09e13) 03:34:04 executing program 0: r0 = inotify_init1(0x80000) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x100000035) ptrace$setopts(0x4205, r1, 0x2, 0xa06ff7) 03:34:04 executing program 3: socketpair$unix(0x1, 0x1000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/packet\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000013c0)=""/4096, 0xfffffffffffffdba}], 0x1, 0xfffffffffffffffd) 03:34:04 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0x0) exit(0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setlease(r1, 0x400, 0x2) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40c0}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x11, 0xf, 0x200, 0x70bd29, 0x25dfdbfe, {0xc, 0x0, 0x6}, [@typed={0x8, 0x7b, @fd=r1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) [ 404.295744] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 404.295744] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 404.295744] [ 404.317657] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffb4, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x101000, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0xffffffffffffffff, 0x0, 0x10, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x2, 0x4}}, 0xd) read(r0, &(0x7f0000000200)=""/239, 0xef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000140)='veth0\x00'}) 03:34:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@local, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x5, 0x4e22, 0x0, 0x2, 0x20, 0x20, 0x21, r3, r4}, {0x81, 0x7f, 0x9, 0x9, 0x1ac, 0x7f, 0x8, 0xffff}, {0x3, 0x1000, 0x8000000000000, 0xd8c}, 0x400, 0x6e6bb4, 0x1, 0x1, 0x2, 0x2}, {{@in6=@ipv4={[], [], @loopback}, 0x4d2, 0xff}, 0x2, @in=@multicast1, 0x3502, 0x3, 0x3, 0xf6, 0x5, 0x7, 0x2}}, 0xe8) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:05 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r4 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r4, 0x7fff) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:05 executing program 2: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7, 0x4, 0x40, 0x8, 0x0, 0x1, 0x80000, 0xa, 0xffff, 0xfffffffffffffffb, 0x1, 0x79, 0x6, 0x2000000000, 0x7, 0x100, 0x91, 0x3, 0x5d00, 0x2, 0x2, 0x1, 0x6, 0x7f, 0x7, 0x32af57c6, 0x7fffffff, 0x4, 0x5, 0x69, 0xda1, 0x200, 0x6, 0x0, 0x3, 0x7ff, 0x0, 0x7000000000000, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x1084, 0x8, 0x7ff, 0x7, 0x7fffffff, 0x100000001, 0x85}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000200)='/dev/ptmx\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00', r3}, 0x30) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x101000, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x2) ioctl$TCFLSH(r5, 0x5437, 0x100) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000380)=0x5c6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) tkill(r6, 0x40) r7 = fcntl$dupfd(r4, 0x0, r2) getdents(r7, &(0x7f00000002c0)=""/145, 0x91) 03:34:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x5) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x0) read(r0, &(0x7f0000000180)=""/6, 0x6) recvmmsg(0xffffffffffffff9c, &(0x7f0000005200), 0x0, 0x0, &(0x7f0000005440)) getuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) r4 = dup2(r2, r2) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000140)) sendmsg$netlink(r4, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000000480), 0x37e, &(0x7f0000000040)}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) ioctl$BLKFRASET(r4, 0x1264, &(0x7f0000001080)=0x5) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ptrace$peek(0x3, r3, &(0x7f0000000880)) fsetxattr(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="6f73322e2f6465762f62696e6465722300cfa48794aeb5ffdebe8bd06849cb3e0a60458e1bff659e67c7ffb3563230db175a4d435bcc387c9eb15756b75995d6cf5cc43b6f404fc8fd81e44ca4105fbb925452d7a5122edfba68c24d224ad2adf07ef22fd9b1829d4ee4feca890bffee44b6fa4619793e35e7057e2f6b912fbffcdb3d0b180f5fad23c55f"], &(0x7f00000001c0)='}(\x00', 0x3, 0x0) r5 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r5, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f0000000200)=0x9, 0x4) write$nbd(r4, &(0x7f0000000280)={0x67446698, 0x1, 0x1, 0x0, 0x3, "eb60dc6fe8cf2688053699d1e9a6050e18a601b22bcd7254e41b0107b6f776639df9cb92afae9632ef17136fc16d937c778e05d4f6818ddec19e89f8fbcc50059c3bed70e3f91fd2a2413aee6b87011595ab8d03cdbf96196a22c5b88746a2517cd99c3e410bc9d712e37d9fa885f6d5b15fdb3368dd37eddcd5015db82d5c56ac9aa6454ffd6ffc346c1efcea6d3023d8ca84fcd716ab15e8f19d75e4cb345eb573ba2326f362447bcc3a0286ce2336edab9f03f94a3e1d5da24d2abe0e5f8d7267506d8eab83c0e2c4399239cd3cca71e82d25a5dc1f242c9c4357e77889380250f8ddfb5a8ee1af01d54c9b3cdbf14c7fa1b66f"}, 0x105) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=ANY=[@ANYBLOB='\vL\x00\x00'], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f000000dfac), 0x1, 0x0, &(0x7f000000df36)="12"}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000480)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 03:34:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffe4a, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 03:34:05 executing program 0: r0 = gettid() r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x6fe0497cd4092139) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001880)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000001940)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x800080}, 0xc, &(0x7f0000001900)={&(0x7f00000018c0)={0x28, r2, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc8c7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040084}, 0x40) r3 = open(&(0x7f0000000080)='./file0\x00', 0x2000, 0x168) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, 0x0, 0x0) preadv(r4, &(0x7f0000001740)=[{&(0x7f0000000540)=""/180, 0xb4}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/18, 0x12}, {&(0x7f0000001640)=""/240, 0xf0}], 0x4, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x38a, &(0x7f00000000c0)) ptrace$setregs(0xf, r0, 0xfffffffffffffc01, &(0x7f00000017c0)="5db04b6908000ccbff3c802fcb94efcb7e3219aaf9e0f553470a2158b77b106b4275864ef6d08ea8accc0a6ee0bf21a770f870b11bbefe232c9911bb4a44855330752c1ccd9ce04b6bb20c9484570ece427c98da0f9606adcaecda714f9b0b3bc255a0faa8cf8c51d5851d3ba0258a13aafc4b89a9") r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) clone(0x2102005ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000001780)='net/rt_acct\x00') exit(0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r4, 0x4b69, &(0x7f0000000240)=""/80) getdents64(r6, &(0x7f0000000340)=""/57, 0x252) finit_module(0xffffffffffffffff, 0x0, 0x0) clone(0x41fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r7) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r7, 0x2, &(0x7f0000000140)={&(0x7f00000001c0)}) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x7498, 0x8, 0x6, 0x0, 0x0, 0x4, 0x20400, 0x0, 0x40, 0x100000001, 0x2a5, 0x3, 0x1a60, 0x1000, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1f, 0x52, 0x8, 0xb11, 0x100, 0x0, 0x0, 0x6, 0x5, 0xb2, 0x6, 0x87d2, 0xd9, 0x10001, 0x2, 0xfffffffffffffff7, 0x100000000, 0x0, 0x8, 0x4, @perf_config_ext={0x2, 0x1f}, 0x18000, 0x8001, 0x200, 0x7, 0x100000001, 0x7}, 0x0, 0x3, r5, 0x3) 03:34:05 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r4 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r4, 0x7fff) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) [ 404.651828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2585 sclass=netlink_route_socket pig=19756 comm=syz-executor0 03:34:05 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0xfe9a, &(0x7f0000000240)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x835, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14}, @IFA_LOCAL={0x14}]}, 0x40}}, 0x850) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0', "2cbd79e89eb7d462cbd36213f66acf7d1e2a122aa5e154ab441dda57cc79dc7c1601f1c61c0b51849961fef706edc6e0032c0ec3e0cc2f3e0d4d46bbf8dda9d36feac53d5e2033b77e44a84213770ca491feeb2023fefe86773b12840d15b6a20c270a8051b40398edb74bd707466541255c99e1901fcb93d5a28eab628862919cd9be9d05837ea11199432ccba41ac1ba6bf87899d3ee407af738fc8f0165801ce70246550af1f4f1feea89d6ecbdffc2eaf6aedea869646c"}, 0xbd) 03:34:05 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x10) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) readlink(0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000340)="120000001200e7ef007b00005380a79a9e58d2f579012f307af36091a2f21f08894906a34123ee5ff52fa09bb6cac5c3989126cac9a37552696bb0000000000000deff000000004d5e8456f7e30415b25507d00915abb21f82eba1b06ad59209940147476872c212", 0x68, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x8, 0x0, 0x7ff, 0x2ddb, 0x14, 0x0, 0x8, 0x401, 0x80, 0xffffffff, 0x2, 0x26b}) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x803, 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f00000002c0)='/selinux/mls\x00', 0xd, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) getsockname(r0, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x80) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000400)={r4, 0x1, 0x6, @broadcast}, 0x10) r5 = syz_open_pts(r0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) recvmmsg(r3, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000300)={0x0, 0x3, 0x6, 0x1, 0x800, 0x3}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="9e0000007502009300000060fe539f25eb8343c096c148c2512b98942dc0b994e9608dc586ba4a3b946c1820726a7f459e7cd790249e90ff4238e96a4b1d91b886431c6ae4d16e16709bfe5cc5723bd7818792adc4246bca0538dbc308ad59862503006dd80145f329291c679ec261b3c57574bcb772202646e0cb1a8fa73adcb59af465eb1c8070d5020007699ef7f6bf4bee02ab9ae2c1930000000000"], 0x9e) lstat(0x0, &(0x7f0000000500)) setfsgid(0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000180)) 03:34:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x5, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x2d, 0xffffffa0}}, &(0x7f0000000180)='syzkaller\x00', 0xed3, 0xc3, &(0x7f00000006c0)=""/195}, 0x48) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r0) [ 404.830584] [ 404.832365] ********************************************************** [ 404.842022] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 404.861547] ** ** [ 404.884137] ** trace_printk() being used. Allocating extra memory. ** [ 404.905309] ** ** [ 404.927783] ** This means that this is a DEBUG kernel and it is ** [ 404.948190] ** unsafe for production use. ** [ 404.970831] ** ** [ 404.992283] ** If you see this message and you are not debugging ** [ 405.016012] ** the kernel, report this immediately to your vendor! ** [ 405.043605] ** ** [ 405.060318] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 405.067193] ********************************************************** [ 405.770217] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 405.770217] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 405.770217] [ 405.790417] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffb4, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:06 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x10) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) readlink(0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000340)="120000001200e7ef007b00005380a79a9e58d2f579012f307af36091a2f21f08894906a34123ee5ff52fa09bb6cac5c3989126cac9a37552696bb0000000000000deff000000004d5e8456f7e30415b25507d00915abb21f82eba1b06ad59209940147476872c212", 0x68, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x8, 0x0, 0x7ff, 0x2ddb, 0x14, 0x0, 0x8, 0x401, 0x80, 0xffffffff, 0x2, 0x26b}) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x803, 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f00000002c0)='/selinux/mls\x00', 0xd, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) getsockname(r0, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x80) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000400)={r4, 0x1, 0x6, @broadcast}, 0x10) r5 = syz_open_pts(r0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) recvmmsg(r3, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000300)={0x0, 0x3, 0x6, 0x1, 0x800, 0x3}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="9e0000007502009300000060fe539f25eb8343c096c148c2512b98942dc0b994e9608dc586ba4a3b946c1820726a7f459e7cd790249e90ff4238e96a4b1d91b886431c6ae4d16e16709bfe5cc5723bd7818792adc4246bca0538dbc308ad59862503006dd80145f329291c679ec261b3c57574bcb772202646e0cb1a8fa73adcb59af465eb1c8070d5020007699ef7f6bf4bee02ab9ae2c1930000000000"], 0x9e) lstat(0x0, &(0x7f0000000500)) setfsgid(0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000180)) 03:34:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x0, 0x3, 0x6}) r2 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000064e000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r3, 0xa, 0x12) fcntl$setownex(r3, 0xf, &(0x7f0000704000)={0x0, r2}) recvmsg(r4, &(0x7f000095cfc8)={0x0, 0x181, &(0x7f0000000580), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r3, r4) tkill(r2, 0x15) dup3(r0, r1, 0x0) 03:34:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc2000, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x0, 0x1fe, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:06 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, 0xffffffffffffffff, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in=@multicast2}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@dev}}, 0x0) fstat(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0400ffffffff08004500003000000000000190ff78ac2314bbac1414000304907800000000450000000000000005010000ac2314aaac1414"], 0x0) 03:34:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x10, r1, 0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000240)=r3) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000001c0)={0x1, 0x5, 0x5, 0x1d, 0x4, 0xffffffffffff3842, 0x3, 0x119, 0x1}) epoll_create1(0x80000) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x180, 0x4) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000100)=0xb7a9) 03:34:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x2) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') write$smack_current(r0, &(0x7f00000000c0)='\x00', 0x1) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000c80)=0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) write$binfmt_aout(r0, &(0x7f0000002280)={{0x107, 0x7, 0x7839, 0x116, 0x11c, 0x803, 0xe6, 0x20001}, "3f6d53bafabb2e52749764a6e06a611a1b6fdb12da4794b22dc963879883447331b72f43bbb9b03653df63e8bff2425494866dbc91113551e513e8cbea88e8cc36a776dc3587c47d8e1d3d8145cb317a4e1ef792ee7387a52c6883a16ce7e29f6eddeaf50f5648f1cc50288fcaf725128e2cd6bc9d1c8be25325f507ad407edd853e61a6d5e671d8af2108aaed06c4d385956a50a0496c4ff4b4a9f9", [[], [], [], [], [], [], [], [], [], []]}, 0xabc) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x80000001}) write$smack_current(r0, &(0x7f0000000cc0)='net/anycast6\x00', 0xd) 03:34:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net\x00') request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='net\x00', 0xffffffffffffffff) fchdir(r0) getdents64(r0, &(0x7f0000000200)=""/116, 0x184) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r2 = getegid() lchown(&(0x7f0000000000)='./file1\x00', r1, r2) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x686, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) stat(0x0, &(0x7f0000000940)) getuid() 03:34:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:07 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) request_key(0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 407.137706] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 407.137706] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 407.137706] [ 407.155489] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffb4, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:08 executing program 0: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/ip_tables_targets\x00') close(r1) fsync(r1) 03:34:08 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @remote}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @broadcast}, 0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 03:34:08 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, 0xffffffffffffffff, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7a7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x800001, 0x800000000011, r2, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r4 = gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x5d28, &(0x7f0000000200)=""/39) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) r5 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) openat(r3, &(0x7f00000002c0)='./file0\x00', 0x80000, 0x108) tkill(r5, 0x1b) ptrace$getenv(0x4201, r5, 0x9, &(0x7f0000000040)) ptrace$cont(0x18, r5, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x4e22, 0x800, @empty, 0x5}, {0xa, 0x4e24, 0x1200, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}, 0x101}, 0xfff, [0xffffffffffffffe0, 0x7f, 0xfffffffffffffc00, 0x1ff, 0x4, 0x1, 0x654, 0xffffffffffffffff]}, 0x5c) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r5, 0x0, 0x0) ptrace$pokeuser(0x6, r5, 0x5fd, 0x100) 03:34:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:08 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fremovexattr(r0, 0x0) 03:34:08 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f00000000c0)=""/237, &(0x7f0000000200)=0xed) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40040100) clone(0x10400, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x44002, 0x108) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(r3, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={'syzkaller0\x00\x00\x05\x00'}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x4000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f00000001c0)=0x1) readv(r6, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/93, 0x5d}], 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r6, 0x40505412, &(0x7f0000000380)={0x0, 0x2000000229, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r7) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000680)=r4) write$cgroup_int(r3, &(0x7f0000000280)=0x6, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb588, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r2, 0x0) pipe2$9p(&(0x7f0000000780), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tu?\xe8\xaa\xf6^c\xcf\n\x00\x00\x00\x00\x1a\x00', 0x800}) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f00000006c0)) 03:34:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) dup2(r0, r1) r3 = dup(r1) r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x4000, 0x7f) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000080)={0x3, 0x100000000, 0xffffffffffffffd6, 0x401, 0x5}, 0x14) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 407.353964] audit: type=1400 audit(2000000048.420:110): avc: denied { getopt } for pid=19871 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:34:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 03:34:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000100)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f000074b000)={@remote, 0x0, 0x2}, 0x20) 03:34:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x6, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 407.681770] device lo entered promiscuous mode [ 407.689373] Y­4`Ò˜: renamed from lo 03:34:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffb4, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:09 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x20000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="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") 03:34:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1008407, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000180)={0x1000, 0x800, 0x9, 0x8, 0x7, 0x100000000, 0x200, 0x2, 0x5, 0x1e01792f, 0x8, 0x2}) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:09 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f00000000c0)=""/237, &(0x7f0000000200)=0xed) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40040100) clone(0x10400, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x44002, 0x108) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(r3, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={'syzkaller0\x00\x00\x05\x00'}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x4000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f00000001c0)=0x1) readv(r6, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/93, 0x5d}], 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r6, 0x40505412, &(0x7f0000000380)={0x0, 0x2000000229, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r7) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000680)=r4) write$cgroup_int(r3, &(0x7f0000000280)=0x6, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb588, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r2, 0x0) pipe2$9p(&(0x7f0000000780), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tu?\xe8\xaa\xf6^c\xcf\n\x00\x00\x00\x00\x1a\x00', 0x800}) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f00000006c0)) 03:34:09 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x0) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:09 executing program 0: socketpair$unix(0x1, 0xfffffffffffffffc, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b70fc2f0157625b315580d62bb6256fe6"]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='schedstat\x00') write$apparmor_current(r1, &(0x7f0000000080)=@profile={'stack ', 'sit0\x00'}, 0xb) 03:34:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:09 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() exit_group(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r2, 0x0, 0xc, &(0x7f0000000000)='md5sumself[\x00', r3}, 0x30) chdir(&(0x7f0000000140)='./file0\x00') 03:34:09 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x0) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) 03:34:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffb4, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x4, 0x1948, 0x40, 0x4, 0xc, 0x1, 0x1, 0x1, 0x7, 0x8}) clone(0x80013102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r3, r4+30000000}, &(0x7f0000000200)) 03:34:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) 03:34:10 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x8000, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f00000000c0)=0x2) sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000180)=""/184) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='HonfLgf\xfb\x00', 0x0, 0x0) r5 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x18400) close(r5) 03:34:10 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:10 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x8000, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f00000000c0)=0x2) sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000180)=""/184) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='HonfLgf\xfb\x00', 0x0, 0x0) r5 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x18400) close(r5) 03:34:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffb4, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:11 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x701, 0x0, 0x0, 0xe98b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300031300000000000000000000000500060000000000180000000000000000000000000000000000ffff0000000000000000000000e9d00a9200000000000000000000000000000000000200010000000000000007020000000005000500007d00000a000000000000f1fe020000000000000000000000000001000000000000000000d22e2f5d000000000000000000000000000000"], 0x98}}, 0x0) 03:34:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) 03:34:12 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)=0x9) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:12 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:apt_var_lib_t:s0\x00', 0x23, 0x0) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') write$P9_RXATTRWALK(r3, &(0x7f0000000380)={0xf, 0x1f, 0x1, 0x3}, 0xf) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r4, 0x404, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3b}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3f}]}]}, 0x5c}}, 0x80) r5 = accept(r1, &(0x7f00002caffa)=@hci, &(0x7f0000c3d000)=0x6) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40240080}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r6, 0x201, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0xec}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x40}, 0x1, 0x0, 0x0, 0x44}, 0x10) sendto$inet6(r5, &(0x7f0000bb5000), 0x0, 0x0, 0x0, 0x0) [ 411.519967] audit: type=1400 audit(2000000052.580:111): avc: denied { relabelto } for pid=20038 comm="syz-executor4" name="UNIX" dev="sockfs" ino=47442 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:apt_var_lib_t:s0 tclass=unix_stream_socket permissive=1 03:34:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 411.596011] audit: type=1400 audit(2000000052.650:112): avc: denied { write } for pid=20038 comm="syz-executor4" path=2F726F6F742F73797A6B616C6C65722D746573746469723133363732373237342F73797A6B616C6C65722E376B656441562F3638352FE91F7189591E9233614B scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=sock_file permissive=1 03:34:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x20b, 0x3, &(0x7f0000c91000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x10000000001, 0x99, &(0x7f0000000340)=""/153, 0x0, 0x0, [], 0x0, 0x200000000000000}, 0xffffffffffffffd7) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x81) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x6000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5c}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x15}, 0x20000080) 03:34:12 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) 03:34:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x8) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)) sendmsg$nl_netfilter(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0xa, 0x7, 0x200, 0x70bd29, 0x25dfdbfd, {0x1, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x90}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:12 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/235}, {&(0x7f0000000040)}], 0x3c8, 0x0) getsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f0000000200)=""/72, &(0x7f0000000280)=0x48) 03:34:12 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#vmnet1nodevem1\x00\x98;\xe2h\xe5\xb2*\xb9n@Pq\xbc\xa9bHoR\xfee\xc7pf\xe9\xed.\xc2\x97', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000140)="6f12f9eb9e69e4aeb9d9c0fe704943d2f83615fa56e65288075e3d7e7e4d89c17e504e3a28dff89ff9961bfc50326303ecbcade9d5c95d53373f55290919a95bf31f03131de7c202d087ffbaf854f7ca2857fd2e54aab23d60710328fd7f865d109537cef858a3f1b180b9af3f11e864071c06bddb10c7488758f8c38cf7bbd53b314c4be83a97f2da53ebb607221d9ef6712cdc40e07585ca69fc13ab2b48db5413bee1f5b83dba696244ede469c6a448bf3d5bd080363a", 0xb8) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) umount2(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) io_setup(0x1f, &(0x7f0000000000)=0x0) io_getevents(r1, 0x0, 0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x989680}) [ 411.788056] audit: type=1400 audit(2000000052.820:113): avc: denied { create } for pid=20072 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 03:34:12 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#vmnet1nodevem1\x00\x98;\xe2h\xe5\xb2*\xb9n@Pq\xbc\xa9bHoR\xfee\xc7pf\xe9\xed.\xc2\x97', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000140)="6f12f9eb9e69e4aeb9d9c0fe704943d2f83615fa56e65288075e3d7e7e4d89c17e504e3a28dff89ff9961bfc50326303ecbcade9d5c95d53373f55290919a95bf31f03131de7c202d087ffbaf854f7ca2857fd2e54aab23d60710328fd7f865d109537cef858a3f1b180b9af3f11e864071c06bddb10c7488758f8c38cf7bbd53b314c4be83a97f2da53ebb607221d9ef6712cdc40e07585ca69fc13ab2b48db5413bee1f5b83dba696244ede469c6a448bf3d5bd080363a", 0xb8) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) umount2(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) io_setup(0x1f, &(0x7f0000000000)=0x0) io_getevents(r1, 0x0, 0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x989680}) 03:34:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:13 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:13 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) syz_open_pts(r3, 0x2000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000000)='eth0!\x00', 0x6, 0x2) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = dup(r2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f00000001c0)={0x6, 0x7d5, 0xfffffffffffffff7, 0x0, 0xf}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) setsockopt$inet_opts(r3, 0x0, 0xc, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000440)) setsockopt$inet_opts(r4, 0x0, 0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) [ 412.818421] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 412.818421] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 412.818421] [ 412.837118] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:14 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x9) ioctl$void(0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x100000000, 0x100, 0x0, 0x4, 0x0, 0x0, 0x6, 0x7, 0x0, 0x39ea, 0x7f, 0x0, 0xffffffffffffffd1, 0x42, 0x7fffffff, 0x6, 0x7, 0x0, 0x0, 0x4, 0x3, 0x1, 0x0, 0x9c99, 0x9, 0x7f, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x9, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r0, 0x0) syz_open_procfs(0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46063ff900000000000000000003000300070000003001000038000000fd000000040000007fff2000000003000600008000000000030000009c00000002000000ff070000040000000300000035090000010000002843799c962f843f89c979000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ef000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000505cf6fd895f198900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x763) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, &(0x7f0000000280)='!+\\lo*-system\\a\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000002c0)='./file0/../file0\x00', 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/member\x00', 0x2, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f00000000c0)={0x4, 0x18ae, 0xb, 0x7fff}) perf_event_open(&(0x7f0000000bc0)={0x0, 0x70, 0x7, 0xfffffffffffff7d3, 0xfffffffffffffffc, 0xfffffffffffffffa, 0x0, 0x5, 0x20100, 0x4, 0x1, 0x3, 0x9, 0x4, 0x1, 0x7f, 0x1f, 0xfffffffffffff801, 0x0, 0x10000000, 0x100000000, 0x8, 0x20, 0xfffffffff835f4d3, 0x0, 0x1ff, 0x1000, 0x3, 0x7, 0x80000000, 0x20, 0x0, 0x9, 0x4, 0xfffffffffffffffd, 0x2000000000000, 0x6, 0x9, 0x0, 0x0, 0x3, @perf_config_ext={0x5, 0x1}, 0x339e4f3e493e4b74, 0xe42, 0x3, 0x1, 0xff, 0x2, 0x8000}, 0xffffffffffffffff, 0xe, r1, 0x8) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x40000200000600b, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='\x00', 0x0, 0x20000, 0x0) 03:34:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000046c0)='/selinux/status\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004740)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000004800)={&(0x7f0000004700)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000047c0)={&(0x7f0000004780)={0x38, r4, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x86a}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4050}, 0x4000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r5, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r6, @ANYBLOB="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"], 0xcc}, 0x1, 0x0, 0x0, 0x1}, 0x40) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'sit0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 412.994417] device Y­4`Ò˜ left promiscuous mode 03:34:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) wait4(r1, &(0x7f0000000040), 0x8, &(0x7f0000000180)) ptrace$cont(0x218, r1, 0x4000000000000000, 0x2000000000006) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:14 executing program 0: r0 = socket$inet6(0xa, 0x1040000000002, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000240)='teql0\x00') sysinfo(&(0x7f0000000280)=""/163) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000500)=@newlink={0x34, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'ip6_vti0\x00'}]}, 0x34}}, 0x0) 03:34:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$getregs(0xe, r1, 0x2, &(0x7f0000000180)=""/255) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:14 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(0x0, 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:14 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x800000000000081) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000200)='net2xT\x80\xcc\xdb\xb0\b\xf5\xc0\xa1\xd0\x96w\xfc/snmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x907) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) unshare(0x20000) link(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='./file0\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_udp_int(r4, 0x11, 0x6f, &(0x7f00000000c0)=0x6, 0x4) r7 = dup(r4) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) unlink(&(0x7f0000000140)='./file0\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000000700)) 03:34:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 414.233840] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 414.233840] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 414.233840] [ 414.252045] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000940)='/dev/keychord\x00', 0x800, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000980)={0x63871a02, {{0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000}}, 0x1, 0x6, [{{0xa, 0x4e20, 0x10002000000000, @remote, 0x1}}, {{0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x23}, 0x7}}, {{0xa, 0x4e23, 0x4000000000000000, @mcast1, 0x5}}, {{0xa, 0x4e20, 0x1f, @mcast1}}, {{0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, {{0xa, 0x4e24, 0x9, @mcast2, 0x5}}]}, 0x390) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv4_newroute={0x24, 0x18, 0x209, 0x0, 0x0, {0x2, 0x20, 0x0, 0x2, 0xff, 0x0, 0x0, 0x8}, [@RTA_DST={0x8, 0x1, @loopback}]}, 0x24}}, 0x0) 03:34:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0xa00, 0x0) write$tun(r2, &(0x7f0000000280)={@val={0x0, 0x886c}, @val={0x0, 0x84, 0x0, 0x5, 0x8, 0x3}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x8, @empty, @remote, @random="dae3cd5c919e", @rand_addr=0x7fff}}, 0x2a) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000200)={[], 0x81, 0xe5c7, 0x8, 0x3, 0x6, r1}) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x2f, 0x800000000000000, 0x3f, 0xffffffff80000001, 0x0, 0x6, 0x60000, 0x7, 0x81, 0x10000, 0x8, 0x5, 0x8, 0x4, 0x7f, 0xa9, 0x7, 0x1, 0x2, 0x2, 0x0, 0x6, 0x3, 0x2, 0x9, 0xd69, 0x3, 0x4bd8, 0xff, 0x101, 0x6, 0x7, 0x8, 0x4, 0x100000000, 0x80, 0x0, 0x7f, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x100, 0x10000, 0xffffffff, 0x7, 0x80000000, 0x6, 0x8}, r1, 0x10, 0xffffffffffffff9c, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r0) 03:34:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:15 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) [ 414.528104] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 414.528104] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 414.528104] [ 414.574290] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() prctl$PR_MCE_KILL(0x21, 0x0, 0x1) wait4(r1, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r2, &(0x7f0000000400)="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", &(0x7f0000000280)=""/224}, 0x18) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x185001, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x80, 0x4, 0x2}}, 0x14) ptrace$cont(0x1f, r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r1, r4, 0x0, 0x18, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0xffffffffffffffff}, 0x30) 03:34:16 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, r3, &(0x7f0000000180)=""/178, 0xb2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) gettid() ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$cont(0xffffffffffffffff, r4, 0xe38a, 0x200) 03:34:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 416.092632] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 416.092632] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 416.092632] [ 416.133403] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:17 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, 0x0, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000340)=0x0) wait4(r2, &(0x7f0000000380), 0x1000003, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) setitimer(0x0, &(0x7f00000002c0)={{0x0, 0x2710}, {r4, r5/1000+30000}}, &(0x7f0000000300)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r6, 0xa00, 0x70bd25, 0x93, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x80) r7 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x1b) ptrace$cont(0x18, r7, 0x0, 0x0) pwrite64(r0, 0xfffffffffffffffd, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x100001f, r7, 0xb1, 0x4) 03:34:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 416.797739] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 416.797739] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 416.797739] [ 416.819431] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x8, 0x800, 0x8, 0x5, 0x0, 0x52, 0x0, 0x2, 0x47b3000000000000, 0x78968c3, 0x0, 0x4a, 0x3, 0x0, 0x6, 0x2, 0x2, 0x10001, 0x10001, 0x200, 0x7fffffff, 0x7, 0x1, 0x1, 0x1000, 0x9, 0x729, 0x3, 0x7, 0xfffffffffffffffe, 0x6f47, 0xb1e1, 0x8, 0x80000000, 0x8, 0xffffffff, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x4, 0x7, 0x3f, 0xd, 0x81, 0xfffffffeffffffff, 0x9}, r2, 0x1, r3, 0x8) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:18 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x5, 0x2, 0x4, 0x5, 0x8}) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xa000, 0x2) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 418.855733] EXT4-fs: 2 callbacks suppressed [ 418.855763] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 418.855763] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 418.855763] [ 418.914391] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) pwrite64(r1, &(0x7f0000000600)="938bdcf708c736ec0febb9f8c4b0a41645759e01c82876f67cce60e634660f13bb761076b3bbb296f2d826e59dee826ab32e7de4a3a3cef12ded2c11ba80739fe1605ad3c5ea38757f4f3c3f5c01e96313ccb1f0d6132f5116feabd81816972af1ead64bfb04ddec7a939b8ced229ecfb294751c4888cdf3adb8e14f65d314f3fb6c48d5479382a19b95d8e24221ee7d5c21c591e2f3133a35b381ce73b439", 0x9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:20 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0xfffffffffffffffe, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x401, 0x7, 0x4, 0xd2, 0x0, 0x8, 0x200, 0xc, 0x4911, 0xfffffffffffffffb, 0xc00000000000, 0xffff, 0x9, 0x7, 0x514, 0x3, 0x8001, 0xffffffffffff8001, 0x0, 0x800, 0x6, 0x50, 0x416be7d8, 0x9, 0x10000, 0x1, 0x3, 0x8f, 0x8000, 0x2, 0x400, 0x4, 0x2, 0x3, 0x2a4, 0x101, 0x0, 0x8, 0x1, @perf_config_ext={0x100, 0x101}, 0x144, 0x7ff, 0x5, 0x1, 0x8, 0x3, 0x3}, r1, 0x4, r0, 0x8) 03:34:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 419.068611] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 419.068611] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 419.068611] [ 419.086839] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:21 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, 0x0, 0x0) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x8000004, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={r2, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000e40)='bdev{)^\x00', 0xffffffffffffffff}, 0x30) wait4(r2, &(0x7f00000003c0), 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setregs(0xf, r2, 0xfa0, &(0x7f0000000240)="f7a8777e4edad7fbed3c86aedd6bbdb93db0f4196dabf1edb1fd367fa563b1f4af1346ab4df846fdd2009b5cffe679cb76f38e7c8e99d47f5a28777e0bd4e8387aa39372c2636713d6898178bc4e944f524d43c993383a6ce64380839a87f35eaaf5f0900f699d42c5e9b7acc29070806681ec33b57cd90455e1d11c828ceafc1ececb81fb2a6618446f40c932b40392e35831a990241f4fdd2e3906d44c6c867902376d210b0500ef635a99ea6cc14eda7c6ca64ae84e3ca0b80054cee2bee2d3a73a11873e4bdb007cf5ecd85905b03bb48f7e430538ec5d7b1839db2d4c952154715f09604242") r3 = open$dir(&(0x7f0000000ec0)='./file0\x00', 0x40, 0x40) utimensat(r3, &(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)={{0x0, 0x2710}}, 0x0) tkill(r2, 0x1b) r4 = syz_open_procfs(r2, &(0x7f0000000e00)='net/packet\x00') r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r6, 0x4, &(0x7f0000000700)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0xb, 0x61b, r0, &(0x7f0000000400)="ccb6c0fa8f93e48f1edba131774d4e70f245768be44b51f250a12e01a9c49f43d009b273db80819877584d18e051a4881b141d9ca8e786e536f53509e24623ee43e49ae2cb4c73e0b34e97319aae6cdf2e14e48b256ba66dd2767ad56d614b1cb9a244d08338c1f4a2d3b3caeba18c88284e728ff6d0e65cc9bd310000e974667a5e43488a070aecb190206f85b1ec4bc6eb30970ba4ed0111e520cd89612c18037461809bf2a3482bd79db3a5a642e885f7993280066e1f6b9ab1a4c304cea19dc5ea9e1bbd2b2ef53cd7d36076b215114a74d3ea0767b2d0de6c58d9f3", 0xde, 0x2, 0x0, 0x2, r5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9, 0xffff, r1, &(0x7f0000000500)="cc6d02a861b1e3fe881da1d2c6bf813d0182ef0a7ae1b0933e1ca9824a60b6ca059388dd8fada066ba2c5b4011cd2b014cf581953b700506ccdecf21f413a6ddddb86fab1ddaf62e8a0dedf21f6050226a09e975bc13b0d388916515f2d9ef9b6c92be72ddb989f98e91ba54ebd75e61f99cbfd679d669ddec77d92bc91d7491c8079b8bcd55395c50a2b92d9561941a04b7e7", 0x93, 0x7, 0x0, 0x0, r5}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x3f, r0, &(0x7f0000000340)="142c33561ca912deffc361dc5bf5ee680d330c282f1b3a737236d6e73f3bee279ca1e2d2992399f050b6602c6cf728f1da6543cee4bfa26f9322c835a1b8a42bd9de52f686cee49313d1ecbb212bd85faa54e089fdf321e259dce570669453bd8776a0143db9e9f02fd9889a", 0x6c, 0xe7, 0x0, 0x2}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x8cd, r5, &(0x7f00000005c0)="76d63cc1c08593bed3a79d17c38f0414cc8adc1abfa4844e394f666615e2b084868ccf747e94dbc7a5b8bb512d8d4e06c249a7d530c231a13a4751a66f27a421cbc9b97e1b7983ef6960459a7a7a770b4feeb0b59eba997e39e9b02f22548f2e95362e5410de74615c69d0ec731f8ef6ce4244dafca079632bb62d44f9e549d6ab5fb9e4fe81da75775010bfeee2623785557f2ea9b853aebf94507d8eca6a421d32b0fd6dee278515484df866e17a58c14dddfc1797768b518f94cfef3a7a3710c94787d971b43a0b6bf9fb30652f067535e7f9c88b04", 0xd7, 0x3f, 0x0, 0x1, r5}]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$ASHMEM_PURGE_ALL_CACHES(r5, 0x770a, 0x0) ptrace$getregset(0x4204, r2, 0x200, &(0x7f0000000dc0)={&(0x7f0000000cc0)=""/247, 0xf7}) r7 = request_key(&(0x7f0000000740)='id_legacy\x00', &(0x7f0000000780)={'syz', 0x0}, &(0x7f00000007c0)='/selinux/avc/cache_threshold\x00', 0x0) r8 = add_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000840)={'syz', 0x0}, &(0x7f0000000880)="8ca04f1f7d982264d4bc7b0c0fb7e45271f151e2b1184a136bce2559538ff6bb955d7d70bd4fda0b1cfba62803d33070d3ffcd3c94462804621427d196974e3d6d9796473efd09269851027d78bea290dafacf5c54ba189710a3df69bec0b925d04d50f8d663abe5fc477fc8d1d594518b50c18cb0ca04d05e203f884c31be294bf7e90818185b79b0b871e1a621e7d64eb543da990764d4d9bb3b7b0d858f8727a2121e218bba103cdbe94eb24bdbcc564e8a82a4eef35a3e6d1f7e4df3f4ed9de8912814", 0xc5, 0xffffffffffffffff) r9 = add_key$user(&(0x7f0000000980)='user\x00', &(0x7f00000009c0)={'syz', 0x1}, &(0x7f0000000a00)="40ca28e298625ede654cf2f53e6c1970aeb8c572d8bdcc8511eaff523e4cfdd2589dc3e5cd8591ab62cab882f73ed8bf339d8e551a6d294c139f7b7c40ba2de2a062746bc812068e9b9a0879ecf368bc19f2a87da9d294c3ba05e89ad40a235fc89a2dd7460521699dea9ceddcd9eb6493561de1fb403e345e018d0e3b65dcde98386326df144935c2699d", 0x8b, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000ac0)={r7, r8, r9}, &(0x7f0000000b00)=""/118, 0x76, &(0x7f0000000c80)={&(0x7f0000000b80)={'sha1-ssse3\x00'}, &(0x7f0000000bc0)="90269d0197c6f3c69713331ff1a8f22ae9f90767aa4219b4582ea39393d285ffa6219744dc8155879ef309bc5cf4036ff169cf1d6303e9840be30a94aa49070b1d2d28afec542f8205b8c69ed33d30eacdd9634c75ce621439a2e702ee3b67aee662fed38eb5837fa5ca427213d341a66cf888aeb95068aeabacd6cc2d6d4effb9f76cc6503bfe294c605401257a894e154459320f7820d8f08aa69330e7886d73bfb9fb2993a6b03638419ff2dedc8cbf0ae3e65af5f70c54b8913f2214", 0xbe}) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) write$P9_RMKNOD(r4, &(0x7f0000000f80)={0x14, 0x13, 0x1, {0x0, 0x4, 0x2}}, 0x14) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000fc0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 03:34:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000180)="1f751a82aa9e7c182317ffd50cc9f35755ebba04843460817e6159b155233ddf46cf37c752ca60b960d802b9baba55e50317fcd1468d092de23a144d22933616ac97735b47fda61cf899124f0ae753e61ebe9195568669fc00fe0a75e751a1bc872da1c845bee31717f1af2f27a5b870e72aa016f549002da87d8fd6ae37a05818e45a97b9bbf590016615574360b4cbc55aa75d4bec7004c792b7ec7e1e30a95646c6e5", 0xa4) 03:34:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:22 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x0, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x40, &(0x7f0000000180)="60e1dae4756765761b2f9dc2298f42728f22868c4eb48331b0ad1c82c19a53e80785bc2b085ecd3c7223cf53684ae9b88d957ddf23841c9fad8f5c31a20301c18632f182603b75cd20029121672ba72438eccc54afcfa53134c932da2ed68ebe8f022d1676a1a2f30f77b539e74ce5d8134e26d932db037df9a9ffdf5f3ad74fd1b76bec5aa7f98ebadb09cbece1658119eab221e8c133e883b788182509efb8ac27e4537b0e5811cef358b9eab9d5b0dbfd1b86ac02edfd91e11878e4c2c0a8b4da5483b1f54ad08be468119b9019a2ebf444a3f74db7") ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$cont(0x1f, r2, 0x3, 0x9) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:22 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 421.267933] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 421.267933] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 421.267933] [ 421.287026] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(r1, &(0x7f0000000080), 0x60000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:23 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x0, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) tkill(r1, 0x6) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='#@\\GPLselinux,\xc1vmnet1system@proceth1\x00', 0xffffffffffffffff) keyctl$describe(0x6, r2, &(0x7f0000000180)=""/52, 0x34) tkill(r1, 0x1b) ptrace$cont(0x1f, r1, 0x1, 0x6eb0df04) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x17, r1, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$cont(0x39, r1, 0x7, 0xffffffffffff8001) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000080)={@dev, @dev}, &(0x7f0000000180)=0x8) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) clone(0x0, &(0x7f0000000180)="3c3ff08d1ab94603b810e57fb9791a39b15eb12c653a4e43b8b6e2004aa0d15b4186c34afec1beb18a1c6443d52685e9fb20e18e4236967ad202d64e0947301a2d4713a22025c3e7b376d3aaed85ab19f3209e6881aee38b9cd7372ddf17e3a9fa7e64044eefb25cdd33c8a44215f5fc0091edc319e98867e6f3405a370c7b0ec5897828e18821ad75ff7f14bae051199f39f93a26f2f8b6d4173b44aafb95c32c50a6b4d9a8321de99b11bc4b5a417f1db2d61382c30ee6075994396ef2250c6a269df77e3eba9bc1a87206fe4a4bcc99cbc01ceed1809d59fc3f", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000400)="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") ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000002c0)={[], 0x28, 0xf8ed, 0x8, 0x8, 0x6, r1}) ptrace$cont(0x1f, r1, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) [ 423.430931] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 423.430931] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 423.430931] [ 423.450403] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 423.532836] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 423.532836] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 423.532836] [ 423.580000] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:24 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x0, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:24 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000080)={0x2000000000001, 0x0, 0x3d, 0x3ff, 0x0, 0x62}) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x40000000, 0x8, 0x3, 0x13e, r2}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 03:34:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x36) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000180)=""/129, &(0x7f0000000040)=0x81) ptrace$cont(0x1f, r2, 0x0, 0x0) timer_create(0x4, &(0x7f0000002740)={0x0, 0x27, 0x1, @thr={&(0x7f00000016c0)="18ad6363b53a744de27e1a006b7bafbb80ba17e22f14ef9afb7a4a3ac2a23f5ee17855acb546bf479f6d7f584f23902aa54bebe602b16a449f3c1fefc4d918414d66a7f8238c08966c4696588dc3974ade163e7a7f39fc3512303b94ecb3db2b64e8653ec753f47887e12e755c3f86e8be26520e1f90b804e9", &(0x7f0000001740)="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"}}, &(0x7f0000002780)=0x0) timer_getoverrun(r3) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="251ed767154eb4f0a9d0effd6d4c87f142ead17f01821e05304cd355354335071163069395d9f1d765e99812736e9328ff2b2e9c6fa04cfb1dbb49fb2d99053dfc53a1e5b6d6147d08a5c660f4c6710b420b9e82d740bf980e33bab4a17f14554d9e6e39c0e096de2c896ee82b656c57e29f74dbe5b2ec", 0x77, 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='\xd2selinux\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)="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", 0x1000, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000001480)={r4, r5, r6}, &(0x7f00000014c0)=""/110, 0x6e, &(0x7f0000001680)={&(0x7f0000001540)={'sha256\x00'}, &(0x7f0000001580)="ac3b772ca6eab8a9bc200bdc46fac7b0b2aed80b7e88d11b663a19e83179b7ceade0bd88c32b9e25cdfe50385f8d1e6253fe88a5952590021eb0fe506f09bb76dbc2bb14c15455921b12a098f974d4ec53e94cc6d8b65c946c25d4ca5aadf829edfca2f02c058bbaedc293a848e7a651d3af8fa3176a3c25c8a85f9ed320351af9b3f421b60979522cc9891a72c7b8b6c5cec79d3062d5bdf87a9230b177375098d404b4c96b47a0a82b16f4bed9a217f88aaad89be0e95e2596b2d983702e566bd546f2ebef8765538b4379f9805127261cb497357d4174484e4d583c907db6fd62836795554938270ace6635aeda5916", 0xf1}) 03:34:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x1f, r1, 0x400000003f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101000, 0x0) r3 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000200) inotify_rm_watch(r2, r3) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0xfa655f4765560e73, r1, 0x411eaeb4, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) clone(0x13002001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x2) 03:34:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:25 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000180)={{0x2, 0x4e20, @empty}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x2, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'vlan0\x00'}) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r3, 0x200, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xd4}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000004) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)="aca3d9df5faeb86e249db6d2f4e98be27389a52f70b3e4645cd537779e95a1fc0836461ddaf465d75431e076ca") ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x9, &(0x7f0000000180)=[{0x800, 0x2, 0xffffffffffffffff, 0x400}, {0x6, 0x7f3e3d64, 0x3, 0x20}, {0x9af, 0x2, 0x8, 0xfffffffffffffffd}, {0x9, 0x120000000, 0x3, 0x8}, {0x200, 0x9, 0x8, 0x9}, {0x0, 0x0, 0x1, 0x5f}, {0x4639, 0x7, 0x9, 0x800}, {0xfffffffffffffff8, 0x2, 0xff, 0x1ff}, {0x2, 0x200, 0x0, 0x2}]}) ptrace$cont(0x1f, r1, 0x0, 0x0) clone(0x4000000, &(0x7f0000000400)="1d3ace17374486391e1497febd88f28b4b04957138fb4b4247ca27e7126ca138303efc4817a7c1aabeef82baea50321923cb803f257f8e0b6553f3c385b9e82be26b2475209a4b2ca7150d8d3192a63d2b626efbb3e0148eebd812f08859bd", &(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)="b037cde2d1bb739c1bd06a82c657e18317982cdbf4dca979cd6aeae784d37901c5b837a52dd7220da7efe5") [ 425.079738] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 425.079738] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 425.079738] [ 425.110454] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 425.356545] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 425.356545] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 425.356545] [ 425.407569] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 425.445046] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 425.445046] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 425.445046] [ 425.486482] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:26 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0x0) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 425.669320] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 425.669320] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 425.669320] [ 425.717976] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 425.895392] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 425.895392] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 425.895392] [ 425.930697] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:29 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:29 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:29 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:29 executing program 0: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:34:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:29 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x3, 0x5e0, 0x6, 0x0, 0x0, 0x9, 0x40700, 0xa, 0xfa, 0x1, 0x7ff, 0x200, 0x5, 0x8, 0x2, 0xffffffffffffff81, 0x4, 0x8, 0x7, 0x100, 0x3, 0x10000, 0x85, 0xffffffffffffffff, 0x1, 0x1000, 0x6, 0x4ca, 0x9, 0xfffffffffffffff8, 0xff, 0x100000001, 0x0, 0x8ce, 0x6, 0x7, 0x0, 0x401, 0x4, @perf_config_ext={0x80000000, 0x9}, 0x3000, 0x1, 0x20, 0x1, 0x8, 0xeb1}, r0, 0xd, 0xffffffffffffff9c, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ptrace$cont(0x18, r1, 0x4, 0x2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'nlmon0\x00', {0x2, 0x4e21, @multicast2}}) ptrace$setregs(0xf, r1, 0x63, &(0x7f0000000180)="1665b3a7aed235b307d849601b2210d66b07b08632d2fdad9b462210a341dd1f6cddf27007d919f4127b0c9f85b0f689c56d5b0adf0bda55512f51b3afee91bb647aba1023e6e8d783bc9c745ae774d6e609fbdd2abcf62c2f84bd4ae440ced23b057f5ec49c9e24c7d7eccbc7fc22") ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:29 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:30 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="5043025600000090780000"], 0x0) 03:34:30 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:30 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x2000000011, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="10000020"], 0x4) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0f753f61e1aa664cffffffff0806000186dd"], 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 03:34:30 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x0) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:30 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 03:34:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:31 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) futex(&(0x7f0000000040), 0x84, 0x0, 0x0, 0x0, 0x0) [ 430.838121] EXT4-fs: 12 callbacks suppressed [ 430.838156] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 430.838156] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 430.838156] [ 430.862088] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000001c0)='\\.GPLposix_acl_access\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='vboxnet1wlan0\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)=']securitycgroupnodevvmnet0\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='\x00', &(0x7f0000000400)=')em1\\cpusetGPL\x00', &(0x7f0000000440)='wlan1lo\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() r3 = dup3(r1, r0, 0x80000) write$selinux_attr(r3, &(0x7f0000000540)='system_u:object_r:systemd_logind_exec_t:s0\x00', 0x2b) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) r4 = creat(&(0x7f00000004c0)='./file1\x00', 0x8) ioctl$PPPIOCSNPMODE(r4, 0x4008744b, &(0x7f0000000500)={0xc223}) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x61) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f0000000580)={0xb4, 0xcf, 0x8, 0x2, 0x2ad4441d, 0x4}) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:32 executing program 0: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = dup(r0) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x240000c0) 03:34:32 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(0xffffffffffffffff, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x36cd5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x80000001, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000180)=""/85) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:33 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) [ 433.229509] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 433.229509] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 433.229509] [ 433.257953] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1015, 0x1) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2202, 0x2d774bb4f6e7aef7) write$UHID_CREATE2(r2, &(0x7f0000001440)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x1000, 0x10000, 0x7, 0x9, 0x2, 0x0, "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"}, 0x1118) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:34 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, 0x0, 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 434.661725] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 434.661725] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 434.661725] [ 434.690382] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:34:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) r3 = dup3(r0, r1, 0x80000) setsockopt$inet_int(r3, 0x0, 0x17, &(0x7f0000000b40)=0x400, 0x4) recvmmsg(r0, &(0x7f0000000a00)=[{{&(0x7f0000000040)=@caif=@dbg, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/199, 0xc7}, {&(0x7f0000000280)=""/110, 0x6e}], 0x2, &(0x7f0000000400)=""/219, 0xdb}, 0xfffffffffffffff9}, {{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000500)=""/18, 0x12}, {&(0x7f0000000540)=""/221, 0xdd}, {&(0x7f0000000640)=""/91, 0x5b}, {&(0x7f00000006c0)=""/147, 0x93}, {&(0x7f0000000780)=""/211, 0xd3}, {&(0x7f0000000880)=""/42, 0x2a}, {&(0x7f00000008c0)=""/56, 0x38}], 0x7, &(0x7f0000000980)=""/95, 0x5f}, 0x1}], 0x2, 0x40000100, &(0x7f0000000a80)={0x0, 0x1c9c380}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000ac0)='memory.events\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f0000000b00)={0x1, 0x6, 0x8, 0x2}) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:35 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 434.836339] EXT4-fs (sda1): re-mounted. Opts: 03:34:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x800000000000000}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:34:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, 0x0, 0x0) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 434.987523] EXT4-fs (sda1): re-mounted. Opts: 03:34:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) [ 435.119753] EXT4-fs (sda1): re-mounted. Opts: [ 436.075504] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 436.075504] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 436.075504] [ 436.094599] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:34:37 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)) 03:34:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() signalfd(r0, &(0x7f0000000180)={0x200}, 0x8) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_pid(r2, &(0x7f0000000080)=r1, 0x12) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x6, 0x0) pipe2$9p(&(0x7f00000001c0), 0x80000) 03:34:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 436.238947] EXT4-fs (sda1): re-mounted. Opts: 03:34:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:34:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 436.332347] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 436.332347] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 436.332347] 03:34:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 436.424569] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 436.457963] EXT4-fs (sda1): re-mounted. Opts: 03:34:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) [ 436.626316] EXT4-fs (sda1): re-mounted. Opts: [ 436.634811] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 436.634811] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 436.634811] [ 436.686237] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:38 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, 0x0) 03:34:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 437.099528] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 437.099528] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 437.099528] 03:34:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f0000000040), 0xc0000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:38 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, 0x0) 03:34:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:34:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x11000400}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xd8, r3, 0x702, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x263800000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ffc00000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='cpusetwlan0selinuxeth1]*\x00', 0x19, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:40 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000002440)=ANY=[@ANYBLOB="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"], 0x2034}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1b) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000240)) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) connect$netlink(r2, &(0x7f0000000200)=@unspec, 0xc) 03:34:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:40 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x2080, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x80, 0x7, 0x4cb, 0x5, 0x0, 0x2, 0x18013, 0x1, 0x1, 0x9, 0x0, 0x3, 0xffffffffffffffa5, 0x9, 0x1f, 0x9, 0xffffffffe60931e9, 0x1f, 0x0, 0x5, 0xee81, 0x7, 0xfc93, 0x3, 0x9, 0x3f, 0x7, 0x101, 0xae8, 0x80000001, 0x5, 0x51, 0x8001, 0x9, 0xc1c, 0xfffffffffffffffe, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0xc20, 0x9000, 0x2, 0x1, 0x800, 0x100000000, 0x101}, r2, 0x6, r3, 0x1) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r5 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20010001b) ptrace$cont(0x18, r5, 0x0, 0x0) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f00000004c0)=""/113) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x82000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x20, r6, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x1) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="4a2800000000000b7f7b65004460cae24e17d2af67cc3d21"], &(0x7f0000000180)='[\x00', 0x2, 0x1) tkill(r5, 0x17) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r5, 0x0, 0x0) 03:34:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(r1, &(0x7f00000003c0), 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000002440)=ANY=[@ANYBLOB="342000000902000326bd7000fcdbdf257500000839c0395a498ff19c893d54299bbe893af80b7437a17b92b3ba9e4818eb8737c3cd31908db5d23efac1a900625952e559e516334947b6d354e6fc2cd7f11cc005db3ded3742c5b8de68a9f193bf88da9940acbf330b4413b6d281f33f898c64c723d95d06ab12ad854f0876cd051d51acf4a4f6d54e3db05c76e306daa5797eae4cd090761139fe0965eb73026d25ced09d05230b42ee59c1d7decf639b77652c1855ad30d996e4c3a69462d9df204f554b6d7ac3ca8179f3b1e0624c49c5efdff0f5eceb03a8b8ff01841d0c148d2df22ef82d425e8bf57ee4293c9cc1e10058fbae16f5662b124336d534f0e763e890f2294b95d89b81431228fde46cab4ff7dc3727438d64c6f004f500251e70531a6362107fce0230226dfee6592727fce47da11a07cc3f262eef7116539832d397572001ed09cfb137f683868725333bcd651129b9d8f55f618bd6a8acc60000119ea261598338d2d5a33a7a796283afbc4ff17266a28f49985731e35e8683c67e58cd462321fd15f78f35b060de40f83e80656e95e98cd8e4c23a9bb5d4f3ebe00c89be747caffb0899456a0eca819c9dee3db56b43654cf7e13143315f7d62fc6c7ca138c85b11d3c37ef104037245bf9a80db596f2ca21ee84887795440a55bcfc9ff9cba9e7341462b5cd149e5ddd13cd6aa7beab1b9936b74b6d28c2b84a01121bdb02f0d9db87e50ae015baae217c51266bca5742e25ce2a9a497259449b207c5883dd8933f620b5ccfcd5edf25faab4c3974d8f1c0ce66096fd665c954df43f2ba3636a16a30c583031cfdd67652fbd645dbc48377f81144b2ef076b17acffb29a982e58d94e995739a5614bb39d1d7fdaae974d45c12f7631537ecbda8c8c42913e234430437a04acee6bd4693afe85afcf55ff7d6a08f980ab2c499dd54b3afb54cbce1bfe1ef128dd295f9c71df9c00039358e64b28ad82a96a51bdd49ad71c0b0561b1f78d471cdbec44485d6c9834c4a75e060db3a4bf721551e3a6491562a971f881801ef222df3d3eef12c603f11d6b9a8d92dba2dc9f617b57bd660e2ed6a437290723bd75149f1579df5bf51974614d0444ce1298e22ab002e853fd6303d1f68e0063176e40f613834910d685c2c9688347b3ec2e08a03df2157d7f62122430d013522fc58df67b490fc0b3591ce76ae4d7941481895b86e5a8f7b523cf93d8b49a87ef8b7da406d8db1f73eb70e49d5928ae9bb910baa2e1f9ce256ccac1997425bf8518b3d33d03b4ae2ccf553096232754df3e201b9559eb4b0d663cca696ed5a2717bd3dee91feef7d6c87aaac1e6c95899cd98ed2a797697f5343390c0a319f2c043bad46626bcebc141350f9ef72505b33f75084429d521deca4495f6c70958b9a29371a939e9fd2263fb76f044b539da4f720dfb4fb7bead4bbc1d1c2411e98c8f84a93b4a4b98ccc2553b63b54c2b66d36ceabeec41997f71af358e794c23ee52c00676b9bae6099465de03d50288eabca24b5bd08fe91a922fba0d8cf60d70f0bc668d51cf70253e0d3dbd77975ecf588836307c6b1babb649e6b2f2c9d2843a4c378cf336cf537f7b028625a7343c86b111edc8e0a0a7a1c40423ff54856e6907efe09d8d35f7aa45bc8257da2f1f6b8e8d281c57a758630606aad6f8ba67ec3c0691f845b180e93ac03261801a5560734ef6861f91927ef6d384007010824f3ed490c796e67293cb80e691d2803423c276bef2a2ff7cff64794fe27139a2a19b59718f186ad19e20341360dff2e964deed1f7e8514f8772fc982ee63a662b768d1aa6d2f43ceb0df14f3674ccf7c25f9d6670fe512a4d7c7c6ed5b42834832bfa1331c58d9ce3428fd4b8c2ce0d3506811ea2cf2c048a3065e5f93f404bbb9e9e13a7e9683ea37fdca47905898da106227ce3ab7dd9f0bd24456c4ab54d3e3f7adb00fd86025102786eb07b0dc7b6654fc3a65473432675171908698cea27d7cc4a536d9b7267a6b3c876bb340b3770945e1f61b0ca819de869ca5ba09e49d51f9d627dd1b00754a60eb726b1d3be137b2ec3ae00ad5507d0384dcf97fa5d3048a27d1a5838d0353842cbcbf1bc9a309d1c69a85cc533d5565050c4167a8f806ff8a6390dfced23ffaac67474067c2cd20a35cda15d10e689992f903516ecd33c80d0e666bed6321e1b05c46fd63fb94935b110514780241afb80d6a1d0336fa600d13eba663d9d766ce1250f5b2bd4b03db084e27a412da2fc444d4e69376d2115bc41a15244419f6a314ddde443db7d530e22d43dfa64519fe5989d5286ec99d7209c3849ff43735f9a2f0022840ceb699f1a947e1c445a600272baf2f4b6cdba5e54b50c898356556a31f737b44b8d8a5252fe459563468b97d7934316fdd8697b176403aa5478bfe33f489627cd38276314378d14a5c0d53a554ef478818b4b622fa338a5062f3392c1125f656f4e24308825d255107778381421d74d192ea7f43c07d66a8f9e7ccef2b50c327752f1be21af932c4d8dac19511af3ca3d95f28f91e5aff0bde9afb230368b1e20c2a4e1caff8dad436a5f2307cd94c92d0255ae20777a8439338319a9d9e40c5ada952a00358a5c84317493f4c03a75e16cc82e3732fc5c446ed80a437ce4b6253e18fe0e9129c540dace506bb3085bd0f52325035ec04aebb38814b28f5fb224520ad571c685c57bb24913c263844d7f201d2e2db778c0ac181322d180f0f975d56f8a8b593f3cef695094aa7cb2d6535f3474bb90a2c47207c0902165344a3979bb15f8f155c1cf9ae50a988d86d5a2a83925ea16888f8d147051471c055ac84532a0d573caadbc1f379c1fab393732b9a291ccfa8c7909d9ee336c1f5947e1774e09a506887452f968d86f91ffe15214b56e8fd1b6e7d25c45d3cb25d807466b58a0903f3ab7c1f5377e492b94bb67c240bf3902d0c3e586362a14c367c467496cfd0be6ab50da8983472f2369647c5381cf37fd23ad5c2ef8e808fb3d6747eca295d09442e2e5de9d693f5a68b8f2a60eff64cc675be35cdf93c042f2c1a405a734774adfe565e7345eb582c3ce582423488fd804223be7946f231e8f59febcd1a111a8f8a562a95d61713ab75e1a8b91b12bde9d81dc5a9a9d728fbf8e53a66e5649f88a061611ed582d73eb21e41099584d41f098352e34150aba1193c00b4753b96833cdeaed17e30c3a10bc2783a48655e2fc4d0411896893576085c4bd0cf4901190efc09470c5c6b03656204bf2656ea9b1ddec12dca82005b8cc1a7a78c9a51ce65ca8a8969a22c09e5a9392cd8844c8e441e6f588f991a891030a8bf2c8e40c58e03a5dbf4a4cec1180f20f3ea805e2513bee575875fd3b55e0b76d11a27fca29703b09484a02fcc67afc397c337b7f8400cc9590ce9fca79887b9787d8fff279abc6437fe660540c20c4fab4c8abf2cf1818e800dd38998f1da9ee4e247e1a358854b07b892f5e9471c5c6ea08d30d043c133bb3a0dd55f1dd9c338a9f4254a3de5babab06507aea908477cc71b5094375ba9f269fe88d250f74eee60b1fd2076c4b7e42f7788f0890b3dd3a750b3128e0e6fe10e863fc338691970d2fe0951febb654a634e5462db4e5f831c78433d603f78025922afbfb6fd0dc60eb56c36a8077d21c7435a6db5a74539f62e02eac737019f9deb7271a669fc532a2fb0e76a1601e91a7a4cae0c3bdac1dbfc3718661b929912c6aa533f3f84019e4af8e56a434572fc706fc1da8f56cdba17435b2fccc80dc1470db040ce555da0c72b63746f50414dafa3486e04bbb57c1dbcfb65e32fc6d93aac818746a30f8c0ae5742a9a29b303000a1fe0b712bbe8522a1c791b74d9883856dc6db5d675cba9c16f0ea1bb1a4f3fa450ee483ab32ef6caab0873a3b3e6b49433c8f952bab44bb94eea85ceefedb22d6432a3b983776e423f54253dfee661608e9064c847f4b1d03d78b89435f81221b5b4d122348390d7d17fc4551f119c3a4d4805a534f7ac00f39ed15e4d85305161ddf806a34ad2c475ca0aface7272e47399c66bca759ca14fc976188fc0618c7e442ea434c8885f85c7ab3ea8725fe0550a480c9a1aed0536146f62aee58dda0fb543eeba6878d616c43b610ff4fcdbfc938226e3681bd5a925aa4631bffd40e35979fb2de1ed557f71d3b7dfda5828b38906b3e833cce34b0f0bcf247b97fbb490b84a9d9fea2ff923101fa112d6c5682b57982cd3d504b12039b00989a7f4be7c215da9bd83a2116bd80ac8044be74cd897b0b8431e1e55676caba219fc0556300894af457368aac07915dcb3675b1c9066d82bdb59019ac49f2ce691ec5aa79afcd378d53592240ebc63de43cd714f9f7809cc38b8eb15c73a7f0574193ad3458f727c405830384f38c3b84c0e02b2691cd6676548033b3a71ff2a360b736d8ed7aa031b38bf3f4e395717060024c4e75d9f7722c1ea4e413cf591e6c6c2bb9359db29126e1a75759c61bbd1954d810cc309fd6fd4af8e1e315d38435f6a81a3d8bc1d017b06ace02739e42d226ef75d45dd155da2d4bf8583bcd25a16f624ff53d89fd46ae54966a1a4d1eb15eb3af414c9d8d898cf8a3c68830c2182a89fe7822552442730247df83781509758358cd18f0e60e8e71670cc194867a7844541944d3cc600197448873374dcb67d9cacd31820aa2ae79344ea2c28dccd873bd3a312b07df5758ab64978b52ee8b8b86d71629f22a6a490c5c9c6a31df81e5f87da3b38b2f363e3897aee65ca185cf3cca84a36b809972ace1e18a16a66c3caa592a04dc5a77757607870d59ba68a03d2472f9ec4eb6627f7d26f4f3937b5d9a6098223080aa35a02a64c072e11040ac1388ec2c51351a946c3d9f6ec33071b79036654d0344a7989190fdfab27d2f4581fa331b9b2bac01308a70a45b9a0b315f17aa5adad289c6ab42c2f224a6c007cfbfdf37ce9a0f9b8c9408a5fb515a07ee2df2251beaf83b5ad688808fd8f3c121e658d7e19d055dec439e77ea18ab1bf780f60fbb65868fa389be390905b0d5bf57c70f9b94b188017abaf1cd87b0e44e770a80ada241aa3649b4f0f9235b2937bdff69582b695b46653026d239724e9cb1b2012d4b80068d081daeef534f6f748827e56d158cb40351cf851cf6e8d0c61578faa20b46793e3fadc18c58354217dce7ba6d7323bf69d6f02b1f64e24f0a5cff4c4570f74d45bb0a31caa774551bfc5baebf3207a8481bbc02068f4599a43b4cf1b055ba0e20a7c1604fee560385f7acb9cd37f84eb883335eb2e9551cbf212be6a68e1f8f97a2fbd0a7a7e8800b578ad6787fb69d9505602e5f5060f5a48151051875f16861a85122f9d36126388d04f07013cbdc512d5bbd7638f2314de2b670874c6c08d18a85709ed98d7f79c9d6d13c075edecb70af60a96c54a61248540ebdef2a1ba34e996c4f8137f231ec04930da5460832660bcc1a8321d34b8de141dc5b7349debf7a399c56913f678c98c0909fb38dc8218e972733a768b3475588e6055915273b9f9bedf5c1b60249201ba91b3f951c00cc799900166f7443e3c611c51e8856f428deb6aaebb966334e29b78f7d53eab0eceab3b09ff1f9ce888be4fd6b9e572e775d87d6cc101d47a6cd8b23029bf0aabe68cc8c99b02d89d4073142aeffd6c5ddeec653267a8eb80e7a9d080e9db68c958f4c054248192e880b81ae1fe1015578423f9ffc737d91aea23a33095da6011714536b8bf25d9dda083517ac5d6c4f280d3aa67d732b81fe519b344d9c93412fe10aa90bed972323b1a3c68e63d3076a732466f18022a8cd8ab7b0abf494beaa89251f23121f7e06e1a1debbe79aa50e4543b9a464c2dfe2b85f8c7d366451477289c05d9b5326162e5617865b989dd80967c07b57f01c988e5a90e22c6c239dda102d0dc9cdbeeac576ded0f0c69df5294d2c73ac3cf17b2165ed871bfa1829f9876b19357c7537960a5c075fdb3d021f147a21b4f5a070b16eef26b4945470a79325964148d8d19c40da9d6b4bc102cfb18c1444417a550118d5c7f1fc52a9a330d68e0553ea95565458c1bd5f36c15b5d4575dc473d885767fcbe577fd18539a0afca835ff8f5422a0568616603a96e10e90a56a83f2d6665e0a0addbf78fc33c955768a4e0bac4e53e8e12d689f32a174422fa9c305a63621081bcc223675f18a6b7f799979936ec6002ceee6820d1c1b32414823349e333ce3a785ed3974092267014eb0f4bea89ea12eed43ddfc7eb52962ed85a84f4f9c7c6e60504f17f1bb0148a14df47b431a9294f7ced5a8f0bfc32a0d77204f2f8dde99d0b49bfc875da0db4889765c4ff2467c0b751aa69601403dac51b29c55e2ceb9f860fe56bd35bcfa99bfaf985d9a98ec2a18a1526a9dc45b2ea641866b941a717054bd77243f470db550799dd580dfea6a7a63d620a6425b8bce268e9410445ab7010d6b3542cce00c144a827ae96741cdf569d9557e855970f82fa9032d5c4d12ef39d5a9c99be1187eaee2d3c2abe8e742e1e0952f5a3d106adef577a71d31d5edccb3c4345cc2d7b4a503b65b789c3fc6220dbddaa555a31cda1f7dded77172159f3122e5e8e2c499ae0a74f83f748b305510b6c1424c2af205de77dcb19f3f87e49cc5e0e7547d29e288e15872a9aed707716e50d303732e26aff64dd9ebe0d267680af2f0f521fdd54a5d1b3c484421a8e0282193fd0936b50c4507d5bcb11fec33329beaf5600db4980dce588833c5f194c2b4fb2c0c633885415bcd5fbe53e652654b6a61270d5298e458a326db4fb74259fb6a0accdd128ffcadf28f9bed1a0c5ce2399a12df4797345486421e9732fea2d75e0c3a131f61717d54a08714ffd31bbed2a9e70e11f3b6bd040109230c24ee6b1ddff8cdcec0602041bbae11dd14ee0e0fbf7bc9b0343b03b2e33541f372882b922136b04a2b738240f0895829bc18aa82eb453270fcbfd454fde1bcbc803fc39b5366c76004588f030d23f43c88da0c37cc8a36ae442260cddf07ceca86010800912772d018a9f9644ecbd55cf90bc9d04cacfcc19575f67ab8c262df83833d343918569c087740b2c2357da5b2128f22e2ae0df55daae626b2f09f1c5ae86bfed87b184d04347a2cc8e872ede34fd40d9c7a00de8bafe3f0b52e940ce712287577d8575c8226b2e273db773c4ea00ad6b29443295282431a0df4a693a00d9d1fd5fbd57b9d7a030e8eb30cedf0346fd1f7bbe9bb7d0c0a698eb938776a70d01a014028848d87c13e7465b69a30642578d330725b9451301aac3611f80dbb30699b8d924844447f5e79f432bd28b5550bae358132b514eac40ef5f3318f2a9e03f3d364db841a0c2167ed1b825659dba4a3d205ba33d70467fa5015d4d1b834395827592c25eb3fa2a3bcc4828eca6ddae845dc7696742285a414ede30ac3a11f8369771c3f644d77ecde61a402696c1008c2b6610100a6c53e028a8e5c7354cb4de4a3dc6d3a5c85664ae53bd24bdfc07bf26da13e5cb713cb9feff44c4422d780baa0a0c4c979cfd187860c07da032d9765bd91b99d530b36a58467546043f7dff9494f7e6a57ffdb2de0d9d64be8928fd3b06d795bd29b3244a491a0b52f9bde5af47efcd8c96a17d2af8adcb5db31410ea2c168d62ae819c41d08e42bde3045a052f2584253bfa699501e44fff4da7c6ac5397ca8dac16d0127316000135135b154e2a422698b5b23e5c64d4e0d37eaf1e56882412e1d2a9af94060c167bbad7190d61a6418c0060c3d2ac2efc7e3a511e79d5729ae22d7f5b0371aaa5c8f11989ff7fa18b5231efc4eaa0ba5468c64b5da63cc13c94b59999af1e3c604cf76d032cab98013b3f9324f136858bb11457492e7fede083b9d35056b3cea4c60e7fed2864b27c105efa0ece8f016147f847d8c3616cb3432924467098f351e4c35fdf1c6190a502530b45b3679e39326a5ddeea6ea64911af07a3a3bc2324ab10da820b4a1f3889b83b52297e174b2cc05ef29701ee0d98e88bbdf869d052b5319986b24e82bc8aec381005ba8fef280c488d9a5849b6c51b45d2cf02bd20fcac641e662b37fa7597479ef1765cfe21b1d2f6cd1febe8be844839b50371d580e88138662e0437f9282d12529b4963a3afc1fcd35275a7ec50627f44ae603495361475a3be1d67818271ab2e8fc6fa60ac492cb450cd4ecc419022dcdc4a9a94a6fd9815e8dd8353128751bf14bbf7ab8918c8a66a1bde80e140f1710cbac920348aea0b8d33e70abf861b794259ab524b6b46568fa6dbd652add83f7bca135a7d8fb89bbaa6433210103f86972fb45270efc5ef2c6cfcf9e27bb42a7b9ceaee11b49ba5be146f9f755d5a60c8791f2b6b37b496f116917443b63a97edc145c4386b69ffe4988a0ab161eb7d750a022c2b8c73a14c24b26ff5447e864cbece6d27a1dd8481fec8b478f9537034c04648fae76bf6fce861ae9ae291b9fcc956bc066019e69bab818a3cae40e6806125e991d3ad4ff391b3b8966afea194582c68feb4f1225877b1a255e5636493adaddb5ce3680d6d4cc97e5294e5c12f91fc0ebbc29857f77766037e80ed87b0bc1e1944c4532139fabf55fcc11c58cb2a36b182a3252a4daba8dfe0a4139da0083904715304bf7e2716148a1a8a8d23e8229c6cd46bc6f81af80cc6169779f9d033d9a5db36f55df63bf8cba9bf5dc3f77bacbf741b71882da83c8c076cebb0064eff455ae31a929e972873c6b30e2e6c402daa585f18496d26ef6f5185c9984f083d0b102eca6b98dbb42ff7d18471c7eec68c0ba8d531f227057a3af8e62485f138cb068c4b2bca0f77bb1b9d0f93586c57227df3b615347119e9ed0b0fd148f5161af9f81ad4a8436a15faa6aab7d31656831785fcd1b01c9ff1a670b830838039b08b4f4a6b0e3dcce728b56621b3aa59407a49934568c260c5f1865b1e2db2ade0b290b743e036ea4bb735f1f8853d069b7d2b812671f4e8830f14b7a12fcee6737f77789ff598f8415fe8c2fdd49e7019e6f6c2dce6a99886354919531e48cfe69889bb9446e63a9ce8f273c39464d9d63ef11ed3e0494d801d68d418baa305c4881b858d66ae897c7e7879a57a26838a3066714e7aa956af8e3ff667dabf8b99f1aeeebf2444789c47910093aba986cdc4ace871afcaecc46e7e69b326195fb552fbd5412eeb09812f6573820e7302ed66ac4a609a6a85d5167c6589b284d88ed613e5cca6a8b4d02384f8d1170c2d8183f9ddb25fb3f4cb00771cb4b90042e3f6b9d221831f12e3702cbc76fff1a8da8d10d04834c2b5c63a98e92768fca541ac70457ba6165c4256ab832574e9b90efa982b63c46a73998c9eb6521e6fceda49cc1f13d92a8a5281b0a80fce97cc9a65a1cfef5098eedda5c47c70abb0fa5381f3630ea564fc2d6bf678ab4f2d04917ff08133fa4965ba8a70a330e1ada99e295f2b199336460f9c7634fe4f6c25a8eab2683135468e2d901b1981de7e98d68eefe499648e3371391b63df8a772b6004b8a609b8310a8e33c18ad0c6844e6103ba09dfaca7969584cb41612fd2d8d3d1c38303ea6a7811ee1a1579d10eb95dd1813ee9f7c3dd4b8924abd2c9e02e30edef5c52f295170655ed1d48d955183db04e65758e13e2ec9d85e9e3a27f8c4d8ccbebc448899a4cdc5650426837bcaf67d93c9b58ac7ed1634a2c4193c01f223462857aedbf00494e667dcb1b8b04b206146cd3a72f806d3f36558a6975f2e65f459dcf30781b30c339e12c90074758e9af0cde2c1d7f16920be6301a04f0749d1438cbd0062aedb3c715a65dfc0eb6213633616ae5941cef7b69286ee84926caab859c0d7bba5523531763cc35e0a41f62525eca2d88ee165219ed204e977ecc51cbca42fd1569ba536f8127595dc4e9bf4cecf0f2cef381a7841e35a05a8c53218dea28fa28b3fe58e4fc04349760ee5651eab173e7f68a67bf8fa05498e9c342cfb9924d726c8b7f8b8592557920dfdcae81966b325f975681c8f15f22dce999c0143f7ad7516a07380ffd0234de48620d19af520ac9b24fd95fb66a24225bb139d605dd81944dc9d3dec56c4ff5361a2f2c22a18f24ce473795d8490d88ace4c7cb879bfb80e55ceb0e8aab58e99f326721ef425c8c5d80b0e01e38e2d568baf840a0e2e3baaf7b324f2cc0469de5e390dfe22d49809837ec8990160b084e4d99f8ccdd7e20bba5cd87983cc292f3e9bf5ec798ce3b05cc63e5fb98d04545ef52a2f6b80b2db292c2c49d1aa219723060712f3e2a805f32febfaf2bebdcb56bf3473655ac586324d865ccdf3e84eb7e3b21206e0ac4293356346929dd82135788873040a07712a3e99e0e382a27d8a8db3447c6beab87ee5e16fdbeb57dd886e566b2a1f966202227474d40c12696f3786dbcd5105b1dac6868e1d5d505a2cc66f7842863f8e4c7c9aa6d6fc8f5a49a9a3199e2290ab8f99b9dbff49c3de5936c22c23aa8e511eb8f11eaf087bdd6115955df6a889805ce408e8e17f9e4b58af6afaa8a8f38e2adc21917dae849afa55550ec1fb34704dbbdc60f4be27bff6b5d7d9ee27797e71602081494c9121dbb2140274c4bbe57103037fc8b2322d891b9efd6e3c99175e7f9f3ed43f1baf552cd7fc076ce9d3998c2ddc98d8f402eabfc3177592cde4775d95bbbbde20d13e8cc5e2cca729bd3cc4d464d1606082f711b489cdac42e184197236a49cefce465b552b5b82eb7ca2c9009eda6b7f778a4731e315d2f79fef77086705b839f3d2573d55880947b0da5405de7a8cc144824dda167e4890fb302a96d9c7936c45cf4b6176a6c1eed5fa3576aff06598c3873532d7f0c4eb48a447f2ef238157c199414038df49a3f3b92b480700dcd7157962599d0b6bbf39f3edd3d90c3f64247c2a4a601b5534188bb0d78833cfd43fbe97b5b2e6eb30110d8ba83325f4119952e97801f2d0645de1fabdb51211c75f6e486a8dc22cd301a421fbae25474c3543fb2a931336f261126c7172ccf195975ed936e61a4317e196be7ef9d0f2b7423be8ade5ec0dac51534fe6972c7c5305aade0983cabeb2d41a153e5830fa8f9f2eecfe3e06b16c9fb7b2792bc3a8f13ec3708ac0bc0e6e14a8cf12d2390bf2a28d915a25d5cdd8facfdb61fb25b37380a316ca92a04d9f79fe60a0d3c262cb8938345fe1072a8b3420a36129779fb491be57be7580be43190494265a3292e323413a89bf33eb7d6a3e85b7ceca8b6ed03fffac7a5875bbb6262da02c4c42595ed510dc031336464cf04e16fe012d99f08a6bf1266c9990eadba29cf64ae380952667be84c32a1dd951a153e57786cfaac767977cf9c26ac025059bbc71318316e3095ccd8dff3874f3a6512653049ff5ad1add2dc39294d4bee5d33c06b51d4d43fdff21419c8ffca3e808d15eb3659d732f73a808a2adf813b29c1d558c2db183c13fd3cd9e2eb7cee08e58769433d71d85070a631818aabdda6c6a9fc8cb0f46f14d5adf58565b9b6c823da5e1f7a0c6ababbb2d0edd6240a8dfc893a2504855972dc94694b21d78f99749da0acc3ec2c5723432f5c2aaecbe2d9d4a0c1f4d92ea05c6576e0aed13830a087c3522f0c5b21a7d6a732daf822b7b6ce136fcbd76f48f41376d4534839026960a3"], 0x2034}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1b) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000240)) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) connect$netlink(r2, &(0x7f0000000200)=@unspec, 0xc) 03:34:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x1f, r1, 0x9, 0xbb65) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x3) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:34:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:42 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3, 0x7}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x0) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x80, 0x3, 0x10000, 0x0, 0x3, 0x3, 0x59c0, 0xf7, 0x38, 0x318, 0x3, 0xf24, 0x20, 0x1, 0x3ff, 0x2, 0x34c0a550}, [{0x5, 0x0, 0x6634, 0x2, 0x5, 0x7ff, 0x915}, {0x3, 0x82, 0x7ff, 0x58815582, 0x99, 0x100000000, 0x3, 0x200}], "fe0cc6959be7b80b87376cf79d0ffe2bcd8825b93163678eeaf5366432243f8c557f556a7e48ffa8dace601490d3eec824946a111b438597575e52257461f724ab80a64f322180b528e28da2c584f46dcfdb8008e365c5c17e3cbc3611bfe1cea553fb1e527d57a3566796154e34664b6ea8828cce1c8c5f12f3014efc9ae21d8dc21081707f7aea3777efbe9faa07c015cb3b201f9af713e9a6709651fb1444802818ef9d4c36270157f94d4736336db5942beccfc1e144372c953bd5f1d30c996f30", [[], [], [], [], [], []]}, 0x73b) wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/keychord\x00', 0x10000, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000f80)={'filter\x00', 0x7, 0x4, 0x4a8, 0x140, 0x140, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000f40), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="c548525aeb20", @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @local, @rand_addr=0xc000000000000, 0xf, 0xffffffff}}}, {{@arp={@multicast1, @multicast2, 0x0, 0xff, @empty, {[0xff, 0xff, 0x0, 0xff, 0xff]}, @mac=@dev={[], 0x27}, {[0xff, 0x0, 0x0, 0xff, 0x0, 0xff]}, 0x400, 0x9000000000000000, 0x1, 0x800, 0x4f67, 0xfff, 'vcan0\x00', 'teql0\x00', {0xff}, {0xff}, 0x0, 0x4}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, 0xc, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 442.037248] EXT4-fs: 19 callbacks suppressed [ 442.037258] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 442.037258] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 442.037258] [ 442.119713] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:44 executing program 5: ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, &(0x7f0000000040)) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:44 executing program 5: mkdir(0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) [ 443.541719] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 443.541719] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 443.541719] 03:34:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 443.594010] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 443.629028] EXT4-fs (sda1): re-mounted. Opts: 03:34:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) [ 443.800643] EXT4-fs (sda1): re-mounted. Opts: [ 444.592723] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 444.592723] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 444.592723] [ 444.640207] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) [ 444.846089] EXT4-fs (sda1): re-mounted. Opts: 03:34:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 445.189568] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 445.189568] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 445.189568] 03:34:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:34:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:34:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:34:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:34:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:34:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:34:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:34:48 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x89) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x100, 0x0, @dev, 0x4}, 0x5d016c9292550c8b) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x949, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @rand_addr=0x4}, 0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='erspan0\x00', 0x2, 0x7969, 0x7}) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, 0x0, 0x176) pause() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) sendfile(r4, r1, 0x0, 0x7fffffff) gettid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000240)=@req={0x100000000, 0x401, 0x3}, 0x10) eventfd(0xd7d) ftruncate(r5, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x8b, 0x0, &(0x7f0000000040)) 03:34:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 447.101003] EXT4-fs: 11 callbacks suppressed [ 447.101012] EXT4-fs (sda1): re-mounted. Opts: 03:34:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) [ 447.293054] EXT4-fs (sda1): re-mounted. Opts: 03:34:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) [ 447.460069] EXT4-fs (sda1): re-mounted. Opts: 03:34:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 448.505248] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 448.505248] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 448.505248] [ 448.535570] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 448.589025] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 448.589025] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 448.589025] [ 448.613128] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 448.619679] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 448.619679] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 448.619679] [ 448.651076] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 448.712686] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 448.712686] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 448.712686] 03:34:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) clone(0x13002001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x2) 03:34:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 453.562440] EXT4-fs: 5 callbacks suppressed [ 453.562482] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 453.562482] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 453.562482] [ 453.638753] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 454.386277] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 454.386277] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 454.386277] [ 454.453782] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 454.782656] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 454.782656] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 454.782656] [ 454.855452] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 456.075936] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 456.075936] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 456.075936] [ 456.141542] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 456.995127] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 456.995127] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 456.995127] [ 457.075251] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:34:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:34:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 458.713178] EXT4-fs: 4 callbacks suppressed [ 458.713213] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 458.713213] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 458.713213] [ 458.789001] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:35:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 459.117964] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 459.117964] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 459.117964] [ 459.182676] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:35:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 459.364985] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 459.364985] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 459.364985] 03:35:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 459.416626] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 459.551085] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 459.551085] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 459.551085] [ 459.605161] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 459.628131] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 459.628131] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 459.628131] 03:35:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 459.687631] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:35:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 1: geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 1: mkdir(0x0, 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x77359400}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes 03:35:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) open(&(0x7f0000000080)='./control\x00', 0xc40beb2474dfd22a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x80000, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000500), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xc00200) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000380)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000440)=""/80, 0x50}, 0x40}], 0x1, 0x100, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockname(r2, &(0x7f0000000300)=@nl, &(0x7f0000000040)=0x80) getsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto(r2, &(0x7f0000000140)="849c9fa60e7821fdeaad0135b82891663842ee2a29fea19b515ae7eead3f29dddaa8d38e339a6f0c49af7b388239170f0bf1bb88375e99009abfe92caa9fd67abbd671b3cf377b757fc47e59ceec13c2b248751fdf2f77cd9244ed67d3feee63c668dd05b47ca972efb5bb2c422e5cb34b7207e956f175a0aa9c554934d9a96687bb01affad71ea7d65aede360824f92fe841cccde5bd8634301721b453f03c3197974533ea7250a697d462d831106676ed4cd99e2af9726c1b025c705bd5cc432e0ef06ea227bd22e0d1d125442171f5d12c566d35e1f6a4778b77394e922ed124a60d53db748f7a42e8b8150", 0xed, 0x80, &(0x7f0000000280)=@generic={0x5, "a266d35ffc92f8cfc8e9cfb4929057ea79607b993d1805103bd2cef9fbff4d1c18b536588fb5fa03661529076c9531177cd537d090f0148810cfba9427f9f5210f8d6c7a9840c58cc93a2cf2dd26c2209294bc1d82793e5194eb530e03796715ecddc4a7c5a0543d45394ba3a9b349b7b5d0ec5455aa3c01b86bae3a856f"}, 0x80) 03:35:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) [ 464.460697] EXT4-fs: 26 callbacks suppressed [ 464.460738] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 464.460738] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 464.460738] [ 464.503990] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:35:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:35:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x80fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r3, 0x29, 0x36, 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x101000, 0x12) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x80202, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'rdma'}, {0x2d, 'memory'}, {0x2b, 'memory'}, {0x2d, 'io'}, {0x0, 'cpu'}, {0x2d, 'io'}, {0x2f, 'cpu'}, {0x2d, 'cpu'}]}, 0x2d) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="00000000dfffffffffffffff0000"]) [ 464.644564] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 464.644564] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 464.644564] 03:35:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 464.688611] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 464.705243] EXT4-fs (sda1): re-mounted. Opts: 03:35:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x220000}, 0xc, &(0x7f0000000540)={&(0x7f0000000140)={0x3c8, r1, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x566b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x101}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4dd}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x3}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @remote, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xfffffffffffffffc, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}, @TIPC_NLA_BEARER={0x12c, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x240}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x401, @ipv4={[], [], @loopback}, 0xbe02}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x400, @loopback, 0xf8c9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xa422, @remote, 0x7fff}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_bridge\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x6f93}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x20}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xcf8000000}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}]}, 0x3c8}, 0x1, 0x0, 0x0, 0x40}, 0x4081) 03:35:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:35:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000001c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000200)={r1}) r2 = perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x80000000, 0x7fffffff, 0x0, 0x0, 0x0, 0x4, 0x4000, 0xc9d2804a444a58bd, 0x3, 0x9, 0x5, 0x6, 0x30c8, 0x80000001, 0x5, 0x5, 0x20, 0x1, 0x9, 0x400, 0xffffffffffffff00, 0x8, 0xfff, 0x3, 0x5, 0x0, 0x62, 0x7, 0x3ff, 0x5e223e0e, 0x0, 0x30a4937, 0x4, 0xffffffff80000000, 0x7, 0x81, 0x0, 0xffffffffffffff00, 0x4, @perf_config_ext={0x0, 0x3}, 0x2801, 0x7, 0xfffffffffffffff9, 0x8, 0x20, 0x1, 0x5000000}, 0xffffffffffffff9c, 0xe, 0xffffffffffffff9c, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400203) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r4, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 464.899830] EXT4-fs (sda1): re-mounted. Opts: 03:35:06 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x6) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/133, 0x85) 03:35:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="516f757365725f8b7eab23ae7e7796b778617474722c00"]) [ 465.037110] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 465.037110] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 465.037110] [ 465.091840] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:35:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = geteuid() r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x82200, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000080)='./file0\x00', r0, r2, 0x900) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:07 executing program 0: mkdir(&(0x7f0000000140)='\x00', 0x0) r0 = socket(0x3, 0x6, 0xffffffffffffff89) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e, 0x80000) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast2}, 0xffffffff00000001, 0x2, 0xff, 0x4, 0x4}, 0x20) [ 466.196369] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 466.196369] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 466.196369] [ 466.261156] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:35:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x8000000000000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) pipe(&(0x7f0000000080)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x414900, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$reject(0x13, r0, 0xffffffffffffffff, 0x3, r1) 03:35:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x10000200400, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2049, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6f757365725f78617474722c008353f3bd10a9bc8b4b92b06b94b683e3f5c03ef93c76347b2a2272cce4f403ec5ba5df81f50dfdf60a1fc0ef4e4a2c97879b2c4326acbbe2b5470057d54eb187f04c5dac9685873f24dda9414c8c198d122b9aa6556bf1b4121b7262ca50759bb51f65d58eb5faf9fea1be3279de9e7eed09ce3a950f"]) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000001c0)={{0x2, 0x4e21, @empty}, {0x6}, 0x4, {0x2, 0x4e21, @empty}}) 03:35:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="6ca027506df1bc45a973273b0744b87e5d5a1d16327d9c8f60405b2e8b9563f4172fa0d37a4bb95b33e04b07a6a085", 0x2f}, {&(0x7f0000000100)="d973183314a6a21649cdc575fccf9b7c139d58aa89e62c992fb684af25c63bdbc3febbd6e2299143f821c589b3ae6b9a2e451157c45520f9a942611abd0267ab6b9e6e63b0ac9699380b0ca42618759cf57a4b729225c46de2d3a462a29531737e65323e573cac4c7468da08cc91879c871b0afb07872a96b2c63652928b2181628516dcfc7ad50d2f19f1a97208f8b72918d6e3c56d7cd4042b7673beff4e107b172dbc1cd093c9ead0db251c44ea63702364a4fa649534d53517cb5f28c55673d00e69e4d11ffacd7e628b5c73a93420dccc255ff13718eafe72baa0ff4dd419e3cd348cf7fa406f", 0xe9}, {&(0x7f0000000200)="24c499446f2b5e085b059b730d1b5d99d765d81b6adc0ae883faa7", 0x1b}, {&(0x7f0000000240)="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", 0xfb}], 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='nouser_xattr,h']) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) unlinkat(r0, &(0x7f0000000300)='./file0\x00', 0x200) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x800, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0xef68}}, {@mode={'mode', 0x3d, 0x9a9}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x101}}, {@mode={'mode', 0x3d, 0x100000001}}], [{@subj_user={'subj_user', 0x3d, 'vboxnet1@eth1'}}]}) accept$unix(r0, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000100)=ANY=[@ANYBLOB="7474722c000bfd50589ba56edbbbad69e2c5f0ceaa84f4ff56209b2965be2d5ca1ea7bf61ffbc6439f01ac3502914fbb703adf1e0032ca93a37e553725c72327004dc6dea0356847c9ff83c25acf0310d5"]) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40, 0x178) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0x100, 0x8, 0x9, 0x10000, 0x9}) 03:35:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000140)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x4}, 0x1c) r3 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8001000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x201, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x1d}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x20000080) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, &(0x7f0000000100)) dup2(r1, r3) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$reject(0x13, r0, 0xffffffffffffffff, 0x3, r1) 03:35:08 executing program 0: r0 = dup(0xffffffffffffff9c) ioctl$LOOP_CLR_FD(r0, 0x4c01) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0xffffffffffffff7a, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100)="63f7f8f2470830c1862d693b8e6d0805b0e7124a2c498c4b780336af4c4117e3622873058179c33fa8112043ec74b49a59afd5696d1dfb1f82e8c6980c9e99b3ff808a8ff007f011a783c91e7c52d0a3497677d0c80dfe2984fcb53f3d78fb76d44c645ff3b7687ee9b69c0a99d6d8078c0d94189d93716593d58f6205a37790a80b6c2a1e9a0e88f80313e5bea1372c124e405ba853f52a9b1cd9d1a5cb8257009892bd28999ccf73b2170a698088baf5d33661f75b02722ad4ec146cf6ae450097cb0de151429a1f78bd58680613fa33fb7cfd4631bb66d3d0b8d6a75fa064e5043f44ab79f45108f9c713cd7c4673a23e0b9a", 0xf4, 0x4000880, &(0x7f0000000200)={0x11, 0x2, r2, 0x1, 0x0, 0x6, @remote}, 0x14) 03:35:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xca, &(0x7f0000000100)="9ece2c3e35ce75b2b92c12ebb5232e14ac15f470eb4eec938e5bb1bd6347817d73de73f83917136c11e1d91eea4b20137f723d39d53c98da5b5a92b1b1cc2b11c540f8cb8065a9ff9974ccdc37affc4e4613e9a1b40b710058ffb4934b9af2fc3feaad945f61fe729a5bc9ea896ed333b2a849639518fd", 0x77) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x62) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="77107b31dc6692e4600243d7d8e4c58a2696243972715d0a5c3f1e7124776254b88167ec262d99bd48754cce6ff2d33aaf65d160afa66ab41ecad85eaca8bd7e5bc0ce077d518681006abb2fa9b8a12db0e9caf832e332e6f16ccbcf90a4778070771c2ae8e2b871db34ca21ff1b5517f89dada57a687fe8"]) prctl$PR_SET_TIMERSLACK(0x1d, 0x5) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x1c00000000, 0x80000001, 0x3, 0x3}) listen(r0, 0x100000001) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) socketpair(0x1b, 0x1, 0x8001, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000a80)="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", 0x1000, 0x8000, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'pids'}]}, 0x6) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000080)=ANY=[@ANYBLOB="c6df9a4396f8af53105273cdb63358a6cd2c9ab47c21bd93619f9d173d26e8c5b3cfa34eb8ec018a1a28c2555579cd1e227dcfb0870a7c6cc08ddc1f7d58fb5ab9553f442b5c416b5a0e6fdcd6b9b958323c3b6ef75a45b215fc60db4b9e73ac8ae0f4345c21e3d0ec54663ad0ca2ccebae71c52a3ad00ca1262f005846ea4abe103fa6b23d679dbd52cd7744175744cfeee0ee381f293df68b92487331516da797b43b6ce155e251bb46a3bb938a9a91ec1914dc151"]) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x20000, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x16}}, {@mode={'mode', 0x3d, 0x200}}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x8}}], [{@pcr={'pcr', 0x3d, 0x2}}, {@fsmagic={'fsmagic', 0x3d, 0x8001}}, {@obj_role={'obj_role', 0x3d, '\xbavmnet0selinux'}}, {@uid_lt={'uid<', r0}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@smackfsroot={'smackfsroot', 0x3d, 'nouser_xattr'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x400000000000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:08 executing program 1: geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = inotify_init() preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000740)=""/106, 0x6a}, {&(0x7f00000007c0)=""/14, 0xe}], 0x2, 0x0) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000640)=[{&(0x7f0000000100)=""/154, 0x9a}, {&(0x7f0000000000)=""/82, 0x52}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000280)=""/21, 0x15}, {&(0x7f00000002c0)=""/25, 0x19}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000003c0)=""/149, 0x95}, {&(0x7f0000000480)=""/116, 0x74}, {&(0x7f0000000500)=""/188, 0xbc}, {&(0x7f00000005c0)=""/128, 0x80}], 0x1176, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000700)) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000840)=ANY=[@ANYBLOB="6e6f757365725f78617474722c00abda78994427a0b0c71a3ad58b02a6ece1b3daba6ac75c64b12ad7ab493a003e9c3cab80752064e0468fd20af4544cba521f09b73f0e9659a3f72417f0028ffd07063d3b53f7a335c063770b958236f4e65654df709c050a2eebfd1bfce03cb148aeaed7aad26da34dbe36298002872bd3080b77bc1d7917"]) 03:35:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$reject(0x13, r0, 0xffffffffffffffff, 0x3, r1) 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, '&trusted\xbe(&security\'}'}], 0xa, "7a28bb4e62a7558e4b28f45c8048ba7b38511f4404da36d7c144"}, 0x3b) 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) [ 467.945775] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=26159 sclass=netlink_xfrm_socket pig=22063 comm=syz-executor2 03:35:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$reject(0x13, r0, 0xffffffffffffffff, 0x3, r1) 03:35:09 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 467.988271] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=26159 sclass=netlink_xfrm_socket pig=22073 comm=syz-executor2 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) creat(&(0x7f0000000040)='./file0/file0\x00', 0x8) 03:35:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='noqser_xattr,\x00']) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) write$UHID_CREATE(r0, &(0x7f0000000a80)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000840)=""/250, 0xfa, 0xe12, 0x7fff, 0x0, 0x5, 0x100}, 0x120) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000700)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x4e24, 0x4, 0x4e23, 0x2, 0x0, 0x80, 0x20, 0x2c, r1, r2}, {0x8, 0xffff, 0x7, 0x9, 0xd622, 0x40, 0x4, 0x3}, {0x6, 0x10001, 0x101, 0x4}, 0x8, 0x6e6bb9, 0x3, 0x1, 0x1, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xc}, 0x4d3, 0x33}, 0x0, @in6=@loopback, 0x3503, 0x3, 0x2, 0x84, 0x40, 0x81, 0x10001}}, 0xe8) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x28, r4, 0x300, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}}, 0xc801) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000940)=0x2, 0x4) epoll_create(0x8001) r5 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x400, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x745}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x8001}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x6}}], [{@fowner_gt={'fowner>', r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'cpusetvmnet0userselfppp1keyring\xb9'}}, {@uid_eq={'uid', 0x3d, r5}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r6}}]}) 03:35:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='nouserDxattr,\x00']) 03:35:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 03:35:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r2 = dup2(r1, r1) write$tun(r2, &(0x7f0000000280)={@val={0x0, 0x8917}, @void, @eth={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, [], {@ipx={0x8137, {0xffff, 0xeb, 0x81, 0x11, {@random=0x8, @broadcast, 0x988}, {@random=0xd085, @random="f4e475ddaae9", 0x6}, "0a3c901ad2d1d54f7da9fec928528dba204244257b257db41e7e1223fbf7ad48ae0f1790c6eba656105ba09a4e0a29af83e3b6bee51a99aa7ebe70367a740cccfc5013a38133a8b4c5751734b01effa2eeb023844131a66e951c79c57016a092425e6ba429945ec47b0b561ef810ecd2097179010048f350e92bebda88a1cea7192638bfcbea89e8bfc560481ce030994944995dfeae530fea0f4ae58f5b44f78b932723922466c7da456199843e3ed5cdf1cc39c18544508e5ee7b196ce9cbe785bb0216ba537b533074c0f2a"}}}}}, 0xfd) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:09 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)=""/98, 0x62}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000000280)=""/172, 0xac}], 0x100000000000023c}, 0x12000) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000380)=ANY=[@ANYBLOB="6e6f757365725f58617474722c003b5e4e1f79336749f40462fece72dbd51ec83652488f5730319b3c21b67b51d29153ae7ed773981e23bd88931aac0e4ccbffe24b8ad1708d91de39f6fc17685197bb4ebb17bd1db02ddaaa96ae5f68e06c1067be1caffd4221abeeb23b4aa1ed6cfc4373e264c3b9d7eed737cde4997392daf12ec52c0fcb29e55fdb38ae94616324d14863384eb5ac46885c39344b967e4ff921ba133491a2e274227fb914b8cec4532cd3a7f147e21ad65258f242b9000000000000000000"]) 03:35:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip_vti0\x00', 0x0}) recvfrom$packet(r0, &(0x7f0000000100)=""/66, 0x42, 0x0, &(0x7f00000001c0)={0x11, 0x18, r1, 0x1, 0xd90, 0x6, @local}, 0x14) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f757365725f78f7617474722c00"]) 03:35:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 03:35:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x9, 0x4000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendto$inet6(r0, &(0x7f0000000080)="d58d9c2a2b04e964d0ad2d61ec", 0xd, 0x1, &(0x7f0000000100)={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x11}, 0xfffffffffffffff8}, 0x1c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001005, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) mkdir(&(0x7f0000000140)='./file0\x00', 0x8) 03:35:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x40, 0x0) write$9p(r0, &(0x7f0000000300)="a0f84b06a460ee788ae836cef2e7c3970d1953212ed1ee2c16845696b498858e5daee92b62", 0x25) mount$bpf(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x44000, &(0x7f0000000440)={[{@mode={'mode', 0x3d, 0x965b}}, {@mode={'mode', 0x3d, 0x742b025e}}, {@mode={'mode', 0x3d, 0x4000000000001}}], [{@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x3d, 0x63, 0x30, 0x35, 0x75, 0x66, 0x7f, 0x7a], 0x2d, [0x64, 0x77, 0x7f, 0x75], 0x2d, [0x31, 0x66, 0x76, 0x35], 0x2d, [0x7f, 0x39, 0x37, 0x61], 0x2d, [0x35, 0x33, 0x0, 0x39, 0x73, 0x33, 0x3d]}}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) futimesat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)={{r1, r2/1000+10000}, {0x0, 0x7530}}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) mount(&(0x7f0000000040)=@sr0='/dev/sr0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='pstore\x00', 0x2040000, &(0x7f0000000140)='(6w\x00') 03:35:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount(&(0x7f0000000080)=@sr0='/dev/sr0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='iso9660\x00', 0x94400, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 468.469960] audit: type=1400 audit(2000000109.530:114): avc: denied { getattr } for pid=22158 comm="syz-executor0" path="socket:[52716]" dev="sockfs" ino=52716 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:35:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040), 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = accept$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e) sendfile(r0, r1, &(0x7f0000000140), 0x2) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000200)='bcsh0\x00') r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x65, "44410b76f19d9f267c448963407203774495a2866e2cdcfeffa3bee821d17388dd0950bdb19dd058037ba97910ba2b0ce66bae93b48293143e11b7c45afee9d1200f515e5da31fc2f8bf0032a86ff38dc883049eb17c04b0d330e52920d4c1fae121177199"}, &(0x7f0000000300)=0x89) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x42800, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f00000001c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x2040, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0xfffffffffffffffc}}, {@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x8}}], [{@context={'context', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@obj_role={'obj_role', 0x3d, '/selinux/policy\x00'}}]}) 03:35:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r1, r2) ioctl$KDSETLED(r0, 0x4b32, 0x1fffffffc0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x20000000000001b8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f0000000040)="97217fed0f76cb687905f242e0628330fe17abc8041cbbf79430c54881d3da9595db0559960cf2cdf364a9e830a2ebb4b198b628480be95c1ca73c0ba9a68b", 0x7ac29623690dd88c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getspdinfo={0x30, 0x25, 0x10, 0x70bd29, 0x25dfdbfe, 0x0, [@encap={0x1c, 0x4, {0x0, 0x4e22, 0x4e24, @in=@remote}}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r3 = inotify_add_watch(r2, &(0x7f0000000280)='./file0\x00', 0x90000000) inotify_rm_watch(r2, r3) fcntl$addseals(r0, 0x409, 0xb) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) link(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x210200, 0x0) read(r0, &(0x7f0000000180)=""/26, 0x1a) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f757365725f78617495722c00"]) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) setxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) 03:35:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f757365725f78617f54722c00"]) 03:35:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x8, &(0x7f0000000100)=ANY=[@ANYPTR]) r0 = open(&(0x7f0000000280)='./file0\x00', 0x8000, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x48000, 0x0) connect$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) epoll_create(0x101) connect$unix(r1, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) ioctl$TIOCNXCL(r0, 0x540d) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000003c0), &(0x7f0000000400)=0x30) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0/file0\x00'}, 0x6e) 03:35:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf, 0x1f, 0x1, 0xdb}, 0xf) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r1, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x15}, 0x200000c4) mount$bpf(0x20000000, &(0x7f0000000780)='./file0\x00', 0x0, 0xc, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000240)={0x5c, @loopback, 0x4e20, 0x2, 'dh\x00', 0x8, 0x1000, 0x21}, 0x2c) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) setns(r3, 0x4a000000) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x9, 0x3, 0x2e0, 0x0, 0x100, 0x100, 0x100, 0x0, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0xe0, 0x100, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0x8, 0x8000, 0x80000000, 0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x25}, @multicast1, 0xffffff00, 0xffffffff, 'ip6erspan0\x00', 'hsr0\x00', {0xff}, {}, 0x4, 0x1, 0x30}, 0x0, 0xe8, 0x148, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x6}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xfff, [0x6, 0x800, 0x20, 0x8, 0x6, 0x8001], 0xfffffffffffffff7, 0x80000001}, {0x11, [0xd22d, 0x4, 0xffff, 0x7fff, 0x40, 0x1], 0xdc9f, 0x3}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x340) 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f757365725f786174ab8d757e"]) 03:35:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x2000ffd, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = getpid() r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) get_robust_list(r0, &(0x7f0000000080)=&(0x7f0000000040), &(0x7f0000000100)=0x18) 03:35:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x3, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') unlinkat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) ioctl$VT_RESIZEX(r1, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000100)=ANY=[@ANYBLOB="6e0cd26f757365725f78617474722c00d145c4f5332869d6c5544dac726410b21f95336c5fb1bf0fba659e7cf874ab834b58d1b30c93fbfd47485ac9f9354ac3e3bf3d67f4c2b088e9486e7f736e5a6c3f9198248f4087bacbae35e8f2669beaf8fc0f2804a9979387151a1dd38b8e43b400fc934159b7aa3452fb349edbe4289a00000000000000"]) 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x4000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB]) 03:35:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000380)) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x88, 0x5, {"05098cb950a5c3ebb69e20df72e4d9b90c1ea418ed1fc6bae738c172b85ca49a2ddd530664ad24b9be08bb826ea5259043c606b9839d4ebe2fe260f118becaba966da49e63ea287c4d8c885976ffea2e63d29e22c84d507a2eef52a9c6b07b46d784c06dd49475f4787a2561d97e"}}, {0x0, "95d74f83425bf62631cdf4731905fc358c0322e3ca58196759675f9925d6b4058241d2186e290a675ff242e71ad74462594612b9663e2c1dfef70eaac570bd746d5f306e8b155571b6781c625225308f128efcd5e784617f0bab8342dcfb244d7224e1cda5f7a3cfb0853147a8effa0a749f523eed4b398d5a4fb1f0bbea613df08db61e5eb1dd3c87e42764d6c54d00a60e7e7f4de72847fda44da328ce9a51e65941250719ee77fbb82dadf79ebd4c12663b61"}}, &(0x7f0000000240)=""/208, 0x13e, 0xd0}, 0x20) r2 = dup2(r1, 0xffffffffffffff9c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x15) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000003c0)={0x20, 0x800, 0x4, 0x0, 0x4, [{0x3, 0x3, 0xad}, {0x458, 0x6, 0x4}, {0x5, 0xf567, 0x406c, 0x0, 0x0, 0x800}, {0x81, 0x871, 0x7f, 0x0, 0x0, 0x200}]}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:10 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0x7530}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) capset(&(0x7f00000001c0)={0x19980330, r1}, &(0x7f0000000200)={0x8000, 0x100000001, 0x3, 0x3cb, 0x1, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000001780)=0x2) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000001900)='/selinux/context\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f0000000140)=""/27, 0x1b}], 0x2, &(0x7f0000000280)=""/4096, 0x1000}, 0xfffffffffffffffc}, {{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001280)=""/191, 0xbf}, {&(0x7f0000001340)=""/1, 0x1}], 0x2, &(0x7f00000013c0)=""/207, 0xcf}, 0x1}, {{&(0x7f00000014c0)=@isdn, 0x80, &(0x7f0000001580)=[{&(0x7f0000001540)=""/15, 0xf}], 0x1, &(0x7f00000015c0)=""/179, 0xb3}, 0x2}], 0x3, 0x10122, &(0x7f0000001740)={0x0, 0x1c9c380}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000001840)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000017c0)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[]) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0xda72) 03:35:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x200, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000240)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000001a80)="af74d3c5c7e5364f3f764f105497e781db60923dcbd42e65c45eed32d91e3cbac63f65f510d7774fa0e4b2bac92a9495dc52204c9d78524390c3e8634b996560718e67e4b5936c062e4c0c7c5ca10c4cc1b739b197137e896e938028578fa5e35f55cf087688600f0df2ae01fc7ca6863988ba5a7fb0025d7cce7959eae2a0908a2a4bf6492b6c58834a886d078721580dc8ceb931c4a18825e94e490f5de0a8900146e2c1398804d93423fa58b87b9602b98186532fc74dffc9b230736b9a6266cc2fe97cebcb7cbe37f20f81e56a6503be3b905501d6e5ef7e25096983be2a337e989de02b99547dd5a80bef43b05a5fd0330412880805d7823b0f5cf72d85ccd355f1e830d0b538785bdd230dac64635f2686ff523b425a33d4d5d018662c8a146b24ef96ca520721c3d3d4123e165f385877f9d13203f8d6884f7deb50833ce5686661aa067b699927abba85d8e26fd6433c3760b54c3ef6bdc60657e1f0ae05967c0e7950009dccf3ee9cc8e3457a2f718c172a3d46ac6b482663e6e60bd7faa8fc23a5e38ae830150dadfb7231eabab0b39c72131e40be1e87d27d7c2ffae26a83dc7be5069aae3714b1e2d75528d254acdce751a3700e18768eaa326b910332b8fb5eebdfce8d34a870684ae8efe8e1bc5ad8a1b8f6ffb503485637e71092159b2a40c99632e818a67b52897e83ad7e8cb1be3f76283f8f9ba2914eaef71a5440d24b1b89350223820c47388b5516bccf5ed53960bdb99588677882de781614ec27fd27f5841d5d566a25812118151ead894fccef4dcbf3634049bba03245d30ea29b58b1d2c5c86cd950491ae9d943907bad8d57f3b21edb0e6f318757439c0a226daff5c38e06125dedd9bd50404262513cdf145f8bffcd0dd883aa84df2481638e79de2a5e261150f87cc35ef847457576e8734dd19461a7125be3c0519f65460978426a4c3b7b29dfca3ee7339301975a0453991bd68ea456c637abf8dbca343cf75f951f0f15f334316cf34c5db268fdbb68ae48e71f8b10f8d5133adf2ae8c63024037e6cbd8b6aae45b0de4c465fccc9ee80803127035bfa1a7fc99040c63ac319ab4b3ae7541e27516878a0a76f9a981b53e83397eda7aa9f5885ff38bb2952f797b0c8166dd1dd869cb3a669edfee21674aa26c7da294fb49fb1b2ffd922a44ac4f5d7e2a7f1a41a71654ae696aba130340ed4256406d616ee3eca2bc04c62c5cf4f9042e8bbd394e77dca9b5c5daf09299863d62ac41963d1bc6531f81b8fe635235fd3df4beee3e2dd571d53969172b5b3aea3fca17cb8a9c65ea8f07bf1520d747d4ee67ff4cbb9038ed6c5fc55b638281241d30bcf79437eafa27be75ba2208d097357889c40661c85f2f57182a3cadd4572fbda4009679b4881574b88a498c356951afd42e38fc3ed7b9cfce570e322063f3b079aa8271a6228c245d2649db795e20adbb023edd3756c2817dd3327c3c1c9928689b9549b309c065a7967a98790a3ff388f9a873a425a115ce248f64db3116da5b8ed18b24fd1aab69514ff8c50a11a63a7d3621d3d63bd1899cc8953917974f6a09b35c5a61d31b235d6325891e06d9d922c2dab0d2801faac207f65d7f7ba6b994cabfb69f2998353342687eecdfcace63278f069ee81c50bdcb22987a01d9aec2028b6ebfab9ab4864377e2087f446bc6592ec56da557ed3e5042c508cbe18074b0e560eb04375f118453e3a702facc820ba85e001df5afcba2e1f5a164bda32201f8b9ee9816f50ac02f0ef966b779d9e01afe1bef740bfd6762d25fda776e002342e283484153e50bc1e9d2f1e054681dcbb1bfa83c7996c7f73453a39d0135b1bc89ea9a81f76725337d8b5fec3f37d05b24d999ac1c327af91a61cb4f70da2d366652b214281e6c7630a3f7b1cea69cc64f8ae9d74a5159530b454fd147d269df25e049d80324517c43be5979c480914d66d15b7cace88be66ef7e88173cebb12ce4c95253f244d0477c45c998f13600516557f07c9ac7de4d4ec8f74b6085e32aef4311250fcfd2890c2e91c1b55d86739d82a55adb7d730ca3848dca5daba35c181726b844a234956e394792adeec9d8f16b0df27e1ab0a8156535480f9adc1fb7d91c6e4132dd8df33a6239bd15fe77a9f17f13e10660b193ec37e73047646057d239e992cc4bf37b0b7d9c429a06c304ee30dacc7679cf60703bee7e8aff8c5e97e2de6ab9f989e79cc2d5107a77a1bb941b2bc2405098aad48f3ecc5a194e34a5e522665cea0626c119f6da9d65c1e2022707b36408cea2464715c411832f8dbbf46fd842cc2a12bf2fad386afa125f861b7bb45909d98dcd6c20559da445737370303177104f09eeb617b0c425f487f526359ce9918459e9ea82860ae84f23100e85919a542eef682c9e1fc3a3218ead5cabf2992364028025325deb222c90ce35da310ed504ed102220f68a56b1851912d2d8c3080c8d29a4e1de58ea33ca8aef6026a5a19f7611111b7a878a460e399e284bf35b642d11d54e5ae6ccea71639dc877188480388832f44dc234bb3aad500ccf97f89b7f392484e850f01473486322f311b5b43f8f1c030e390fe08d3df1de9899d954a03277f5f63006168a3d036cd8c5313f2e154c2dddce0afa0c2be5a4f9dc890f03ce38faf90fcb8ef5661766587083a5fec14b8d97a1cd9f2911838ddc58b612644c8f4308543399bc08a591ed0790e28f8c91609d5b50f2de0d353357e108b66cbde6c4b9832b8a1fa838a71b644c9cc3d405d5eb536fe1fec084b49a26ca0982ec7daac4bcb501252b2e8efd0a5e5f4a9a1d6d3b71c2904247990363f074c48375285f0ba8b73a7bd86d0416a90b855156c19617deaa508bba078a2805f3f0686d5d72a05eb27a89205eaef71e7d6792bfd38aabe15a696c17be7845eb242705c6528f9ff01f4cd3606694af032d67d5c7cbd173b129e280803ae23ca3bacb9dea58c7b9a9ac32107626cd8e026c350bf4a8af070950e4723876c52b66fd7d74422e62cc4615787044d0041b806a7a9500d2d07c2641e4ddd13fe31639afca17962d2b360befed47d5e19daf2721a0bd80f5ef2dd83368d23da03ab61ecb5ebbb6aa8497c3309c8f42e82f7886b4c1611f440d8d46afeb0b2432eee20aeacae66e82fc9df2305cf76750ddc8b29ab615bfcf158740a6e2e8f9e3eb2cb6bb720ae0b63504b278cb7a73407eb33a8cd823309c3e2fa10d0aeda82d646e3cd847a1002ecd609a4098247c33e359940b7c35437f4027e6cb51471b8280e8b8f23076ce0eeb38a1f2ef871bf0123827e7491af5a2a566e5333f57b80fba907aa8aa295de5f46d6fe16188de4330dc2b8f53b42831670058d2f8266bda54de6451c61bd7de1913a4d2c8fdf6b9af4d5e5a4a40a8fe69101d52e41069e0503e3f0552cb86154518e04834f692857f73333cbe032777ba6927ea8886202a81cf261d17d0c3977f2c30440b2d047dcf50034ca82cc5b1b7b07d6729781852ebfdb181add02dad3a74a5ac075b8fc930af2e97816bb40dac0e207f0cb5ad79b52957f5a30b49588b1d2cd294ea79db7378be1759ce5ad395423ae6cfad832aac3b99fe465c4ebbbbe66848296e3a45f0397411c39a10e12c8ee44edabeee85b6cfd63fd039eb44a46c5574bc5ba57acd1a05252ea2385f5033d1a455dffcdf73876086f2f1d12f1d7dd4ea4ae8623d61105210bf88d4ad70af74f909677bceab9d3a9d30b166a2ba875f06ca16a3d36d14b1effda875404b30d11d17b3221ebe76a0eefa3b60f5d1ca76b102e73ed0b5170a117804f56895c653c285d8b05e9ff44b5fdaa95cee3064165afafeadedb9843c5b280b78739e897c14b644a4c9a8364d80c0eb5b277efdc5f6d86e491d6d6c672c16aea3fe2961b58989d99b73e06a5ff9af1898df43b8fd0ec7e2964b28dd4af7b223003885645094a5d28bb49292431cd21079df6b5873d6751295b2a332f05a6065a15b49029653544da12827fa233ef8311d0d7e1fbe4145410fcb4d68698d548f0800cce513385db63f91a783d678300e586d6403ab9d1fc8207a92ad1338aa238d0f5fbe8aded7f215c6ab9de999b1bfb6a10d0aef0c1d869a5e2740a8b7d37431a7c9a153b04ee59923bc2507e165ccb66178ec221552d8cb46092825c1a532a33456e65de908efdd055bb7fdb609baf7f8612fbfb43bd6e9e9d604a8b54b631be03aca849f1302dac4ef89360e8166d802cb1dd60277ffea9286435b4511adfd5417069197c169e9c4379c50aa07424f995cadbbbaf89dc3e9170aa9e9801c5e1ae613a61efcd78f52496ba28695e70d181b4ffa62c876ba8065b5a85cc2a9505a0496deeb4997c2308fe9c09d4f8e6480b054b49d2b8d12dbd0eeaf9eafe317d2d85592a5aaac3fc91b9f9fcbf6f3bbc5f4a55e0c989ee7941df9b8a822d692b209659b2f478be2edb09ee97b4aa3f3ccb62cab5995f9df49f6c707b44d1137060020afac34c1a1e32ff259c9ca0b0b502efe8078f0beb9d6131e160f0cf360663ec24b35839d2b07944a9178a1a11217bbb76d50dad91ffb8230a1479e6bf75809b3407f3d0f845a984bfdb11dc632c77d7567b45079a4954b4f8f0025243a46177c0cd3abed4035c3586073f833cbbccbb7f48bd3215ebb8eae4d5392451305b066beeabeed0658af6bcd2fc2307bfe0e327280c859c6c0b65fc69d8442d4c79d57ab236e41e9590ae2ca5fa16773f89152169fd7a4bf412d55df980c98abd2ed1781ca4bce8c3c3d857839774b56f73c384f42bd438c838219ad66ae8d3ee4a23f9d103098d76df86e8e5d7aae8b24444c826d40c06a4d4623745f8ddf5696ffa6870cbf3655284b8c1b5b01ee3a5f00235fa7de52cf2002ee339e0bdad759b9988bd508f9bf85bb265673c54b8508ea143b7b44dc0b8f0a3fe7b141c11ca5c4cef0177368e97eba0d0e793ab432a3f6f24df23ff4b1926487571a37b7255907262c3b2881206d369fffdde6bf47f66b1e5e729f614eb822e61a06a69c6821a229a0fd7bb026ba728b64560d893d7435701bfac0a8d6dc5c58211892dd10b6c893d18583a21db54aed6d47035d45a0e4735a222258d4709c6627db0c9fbb8aff22e9d708c068f6dd7effe7db5b3107805fd279680fb8a346e66ff855d6653d0ae3574b194d96d5ee259f424dbca659339da16687eb193c22a1cb5006ca098fba2338cb0503f0f93606c1c4edf26006eab344b29ad1122516fa2acb3f18c113b593c909541e1beabfa1ba2992c79fcbfe17a42373f08ddd7e74ce794a58fe8f6d8544820726c9bc2ef4ba3154348ed3d27028851153b1df46c1c15c8b72ba32c3a59f82b4e0d8e084bd512226439f1cf9e158348c4daf0cd1462586b9b654e210cb69e203b45ebba8b9b323d910797bd79aaca9ea13d303c205e2472875ef590945026e27590a3edfc4a58e2b304722ff27386904d9ed926c3da35c1df147050f628e97c9fdd9200fd85b8641f4adbcf9677cf7a42ad1912cee60e26e3f4990666e67680f13153128d0d474707c641fa5df0e4d34b5c22385228343b1dfc00fa77145231eec006cb779c39ae1d1c2106fc4441e4f169fcd5c99c54d1d6c7e9081260e4fab8e33a116960ffd4c04d5864ce0a19e036d0768b7d0ab420b9b28d5bc4a5d85320cd14928d57c43dcf0f38543717310dfa3544811aaca8e79597ce7bb667bfc6c621dc24bc6d1bb56224d7dd48301dacfb85c5cfcfd9cc2ece45da716b967145ae3c07457574e109af43298be1b5bc04e8e3dc71c36212a3843f2ea0a268b24a679813d8e712e83f299c0cfded4360266c41af629e2f2597285df4999c3ac8a64", 0x1032}, {&(0x7f00000002c0)="659f7dc45f77f2c928ede3c01966b6f98d0eb7f5a9d93976672e4ebad767f67f7441f6041eadb4576b70a420956f0804b7d352b4340e7b7b64e7675e1bb07de30480bc77fafeafe1f2286d1f22ee830981df1b6a6295528a390a393c4ac3c0302ba80f39869c074102e7c1c295583aa2fdc680cbc267b70b01e2687ce1e18946c80d0c7204c3bccba9cad1d8bb219d4efd7a288ea145acefe5e69f39ca54351a8789787bd319e0a350efd4e2b690c3a2b055245d2adfdfac01afc0d6878026175dd8143164376615bbf988346ba916a067423b71b0b541be0c16b9cd8b92f6962d5cdb0cd9874e1f2ca19b", 0xeb}, {&(0x7f0000000580)="7c89e2ef239cc99ad99008d098a396e588295d0acd56e6bc96df773abf88d78968dc1cbad30b9831e81b4e394094a060287856188171286d7ed8f81b0f269b5b2547a19a85fe59763553746552fc5421bcb710891a773aeec5cf5e74b2d0401f64dc9eac3a709bd30e295cc9c319c90d02560c44e5feb28b0b42e4434f3cab721dca6e0b6db4c7b2cc4f64020efa2c9a32273569042427e059fe101145f613aadf6366d8e668f945b76a88a2324dcf604c6fe02a6889711085f6804b5406a1d968", 0xc1}], 0x3}, 0x80) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/member\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) readv(r0, &(0x7f0000000980)=[{&(0x7f00000003c0)=""/159, 0x9f}, {&(0x7f0000000500)=""/106, 0x6a}, {&(0x7f00000006c0)=""/163, 0xa3}, {&(0x7f0000000480)=""/33, 0x21}, {&(0x7f0000000780)=""/90, 0x5a}, {&(0x7f0000000800)=""/138, 0x8a}, {&(0x7f00000008c0)=""/16, 0x10}, {&(0x7f0000000900)=""/125, 0x7d}], 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0xffff, 0x0, 0x0, 0x1020020, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='syscall\x00') write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, 'bdev'}], 0xa, "435de23c82145e606d737153a096cf1bbd0eb4b5e59d5d567762e9696551c01f41c82532888bb3469453118f905a2f8568a528e7b2e73bd4ff6576f50ea1d4a1b5224a216411884dc668d3797480425365f925171a6b34e35393527aeffb007936750bbc17818e6bf53ff4df4d8c81148d715cb5ed79417e1039d4517caa8e576099ebc7c04cf8998071e805bf587a00f314de13ddd3c2baf397a20bfd9cbb840dcd389380302aa046fdea405ecf49e97a6ced098f07811d2d8954753213b2b4c6a0fdd4ba42c32981955568baec8a0a42645f3624fac4d29f6d74a8611ce6"}, 0xef) 03:35:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f757365617474722c0013ce1d559242e31faf04e9a62091af3206c054d48e65d9"]) 03:35:10 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=@ng={0x4, 0x10, "218b34845723d008f28a6ec01cc5a5a855abde7d"}, 0x16, 0x1) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x3, 0x1, [], 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], &(0x7f0000000100)=""/1}, &(0x7f00000001c0)=0x78) r1 = syz_open_procfs(0x0, &(0x7f0000000640)='fd\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, r2, 0x2, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x6, 0x2000) r1 = dup3(r0, r0, 0x80000) write$P9_RREADLINK(r1, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000100)={0x2, 0x6f, "b2c4a8cf27ebd13959446fea386cecb3abc1c89841349baf845acabbcacecee320766bd12745d520b2ace55a77d34603a6cd05d19c680b2c93ceaf54762323798762f07b6b5e6e165cbc0a6d284e26cfc05f8732807f45ac522a52c6ab295d2e869991c137eae62fab7c6d290d525f"}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() perf_event_open(&(0x7f0000000200)={0x1, 0x1fd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x0) open(&(0x7f0000000540)='./file2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000003080), &(0x7f0000000040)=0x4) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xfff}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, '.'}}, {@obj_role={'obj_role', 0x3d, 'md5sumOeth0'}}, {@obj_user={'obj_user', 0x3d, '$em0.)eth1ppp0proc'}}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f7573efa215adb8da7b9e65725bc5bd14f9722ca27650fa50090000000000"]) r2 = getpgid(0xffffffffffffffff) r3 = getpgid(0x0) rt_tgsigqueueinfo(r2, r3, 0x3b, &(0x7f0000000240)={0x1, 0x62, 0x643}) 03:35:10 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:10 executing program 0: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1b) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000180)=ANY=[@ANYBLOB="0b6cfade6b2dfc00e465679f6b03b1ef6924b3f12ecf666b85a39c6295bca6a666bfae507606c945c4c7e2b7a1284aeea6bb030000004467a2eef781f0cc360f3ddb553c3d47e1f555c63c5362cd207a35b6f6dc3fe00128645301ed418d590c1cdc03b371ee2d4d000000000000000000000000"]) [ 469.484510] SELinux: security_context_str_to_sid(staff_u) failed for (dev bpf, type bpf) errno=-22 03:35:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffefffffb) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000140)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x1, 'dh\x00', 0x1a, 0x3, 0x6b}, {@empty, 0x4e22, 0x12007, 0x9, 0x7, 0x2}}, 0x44) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f00000001c0)={0x74, 0x9, 0x6, 0x9, 0xffffffff80000000, 0xfffffffffffffff7, 0x10000}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x2000000, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0xffffffffffff8000}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x10001}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x9}}], [{@measure='measure'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'dh\x00'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@subj_user={'subj_user', 0x3d, '/selinux/checkreqprot\x00'}}]}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000540)=""/198) socket$unix(0x1, 0x1, 0x0) 03:35:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2200, 0x150) flock(r0, 0x9) 03:35:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="ca4252ac939b9274b013e06cfbe332b2ffaade23e5478c94b12516927709a2f0f186f7ac9015bbbc9fd09cf3089d9673813fad0a04792cecfe4e71d6cf8a48d543e21764284f8f4ccc59bd1e73d3f5aaad4e1cd025a506bb964828e96c28d3ae67150adbf41160", 0x67, 0x3ff}, {&(0x7f0000000180)="4120f6b2c048faf7e3a716089ed46fff3c3bf6709ac8c34938d366dfd1b6c7b3f660c8d786e6ef3e4ae602a741b86635c34c5b410d751bf190e5e8c15ebcf797a26d55043e1d07824487186646f5c36dd4e480d72da3b3db6af52e65dc970cd7774b52756794dd427ccea1ab8399d9ff165610bd6fba2be9e90a7c829cdd8cbcbbd03c380e3d80be4cda073e232e98cf2a910f17ff7afbf74be363647abb2050945d1002010abeb6ee3876d1e76742a0c85c66e8910d96b26471859ec5f889e89c44b049723c3e19eb256a2db540887da22cbc1b3312cb8cb27a6f24fb333d0a04", 0xe1, 0x839}, {&(0x7f0000000280)="0b3160f1126eb6b5dbe767dda3", 0xd, 0x591}], 0x2, &(0x7f0000000340)={[{@nodots='nodots'}], [{@appraise='appraise'}, {@subj_role={'subj_role', 0x3d, '/%wlan0+'}}]}) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200000, &(0x7f0000000400)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x400b}}], [{@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@dont_hash='dont_hash'}]}) mkdir(&(0x7f0000000480)='./file0\x00', 0x41) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0xa00, 0x0) mkdirat(r0, &(0x7f0000000500)='./file0\x00', 0x42) 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:35:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e00010000000000009a00002c00"]) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) 03:35:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2003001, 0x0) 03:35:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r3 = request_key(0x0, 0x0, &(0x7f0000000500)=')eth1-\x00', 0xfffffffffffffffc) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) signalfd(r4, &(0x7f0000000200)={0x7e}, 0x8) getresgid(&(0x7f0000000380)=0x0, &(0x7f0000000400), &(0x7f0000000480)) keyctl$chown(0x4, r3, 0x0, r5) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, 0x0, r6) prctl$PR_GET_CHILD_SUBREAPER(0x25) r7 = socket$inet6(0xa, 0x8000000a, 0x2000007ff7fffa) r8 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/access\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffe7c, &(0x7f00000004c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r7, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00fbe50402ce92c09c449ab2b948ebbb0ce7a1030755f1f523b47365ef1d995e13a3c0493860098f1b92362eb19492bc164ca716887c11d22036b57ff74f666642b8ec91426da608617bdd4c7c52b4463aa1d16f0cb64caab6a9c51abbfcc291877d059462ce9aa827a85b86e07254d05edd6e2980061cd67e14e03d33b5b67d26b49d1b9aee0895d7b1d5d58d07a0700d7cfaa24ae9f4956e37c57451d4668b550ce091fd44e6f319044ea08a7c9f66ab798740daf6192fa1875bb040c49d93e08d4c55cb89f763a2c04abb2560278af6007cbd49d0f28297c0dfdf4291c13e"], 0x1, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r9, 0x10e, 0x2, &(0x7f0000000140)=0x10, 0x4) fcntl$setflags(r8, 0x2, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) 03:35:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x6) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RLERROR(r1, &(0x7f0000000080)={0xa, 0x7, 0x1, {0x1, ']'}}, 0xa) 03:35:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 469.704505] EXT4-fs: 44 callbacks suppressed [ 469.704514] EXT4-fs (sda1): re-mounted. Opts: [ 469.731925] EXT4-fs (sda1): Unrecognized mount option "n" or missing value 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:35:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000100)={'syzkaller1\x00', 0x5}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) 03:35:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = dup(0xffffffffffffff9c) sendto$unix(r0, &(0x7f00000004c0)="3426dffabb97a859bc98dbe59aff92e7ef5cb9c1ebb0685ecbccdce64313f1253814c17f8e234bfba61428b6cbca9f8808bb2e7b339e378245ffbfb1c5dd72ab117bc8a190b5fc72c0333277510db867c5786a6df9189076000000000000000000", 0x61, 0x40010, &(0x7f0000000540)=@abs={0x0, 0x0, 0x4e20}, 0xffffffffffffff6e) accept4$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x80800) setxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xb823f2d9bb171820}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@newtfilter={0x2c, 0x2c, 0x21, 0x70bd27, 0x25dfdbfb, {0x0, r1, {0xfff2, 0xfff2}, {0x9}, {0x2, 0xe}}, [@TCA_CHAIN={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x810) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000180)=ANY=[@ANYBLOB="6e6f754c96e86e802a30d0ff00001fc4e22f5d9dc2516ee04826b0b091a65d58ad970001000006ba367fe56858e904a483a128c0bcb62f8ee0e7f68b0000000019a932c4e498e2b8b31a33d7db77ee"]) [ 469.863580] EXT4-fs (sda1): Unrecognized mount option "n" or missing value 03:35:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 03:35:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x200040000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) [ 469.919165] EXT4-fs (sda1): re-mounted. Opts: 03:35:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)) 03:35:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x1af, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="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", 0xff, 0x1f}, {&(0x7f00000003c0)="4c2eb6d93478637ffe4b31114b528d453cc72b7ed4b06f523a8a1b379875c64de26a1d4e5262529aaf2eeb3c1d8dc929cfd210a675816a6c1c1fcbc47346a412de150d7784d64853a742a6cbe40d3427057be9f8c2ae11a9c84b8d44135abe66d3cc5d15928b9f7a349d9fcffc1ba6ed17c226940c83c4418bc0ea40", 0x7c, 0x7}, {&(0x7f0000000440)="fb092bd20a130aa4b9d8b93d61fbe89ab0933caef886d3045b330e89b0eb3807421f21a49dcc60d971dc94d35cd0d3c8cd337855115179172b2540cd0fcdc3e5dd96c2b1df4625fbf312ada43b121e55ecbb1cfe84161d0bb6298999cee320f9431c2060ee9e430b97feccc29c1e59d13ac45f10062e4044ba3795c829ea4d25888594e76b1bcf58f6190c00ad93f7185e5943bfce7c1b35cb784968cd668065aae6c14f5fd3dd0390c14ef34c5d038355f0be59152ba8d836d845a54d48cb60a4f9f04d2f9c20e5ea7a9804afc7e08feb4e84610fe390ce3ca2", 0xda, 0xd295}], 0xa000, &(0x7f0000000640)={[{@nodots='nodots'}, {@fat=@check_relaxed='check=relaxed'}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffc54}}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@smackfsdef={'smackfsdef', 0x3d, 'keyring\x00'}}, {@subj_type={'subj_type'}}, {@seclabel='seclabel'}, {@uid_lt={'uid<', r1}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.redirect\x00'}}]}) r2 = add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) keyctl$reject(0x13, r0, 0x7, 0x7ff, r2) 03:35:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}, {@sysvgroups='sysvgroups'}]}) [ 470.034295] EXT4-fs (sda1): re-mounted. Opts: [ 470.110264] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 470.110264] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 470.110264] [ 470.140986] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, [ 470.171604] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 470.171604] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 470.171604] [ 470.197580] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr, 03:35:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f75736572720c00cba20d70ab706336cb8ecffcafc83f452f0a8c09a971fa15f2900847"]) 03:35:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:11 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) unlinkat(r0, &(0x7f0000000280)='./file0\x00', 0x200) io_setup(0xfffffffffffffff9, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x7, 0x31, &(0x7f00000003c0)=[{}], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='.\x00', 0x0, 0x2001001, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000140)=ANY=[@ANYBLOB="6e6f757365725f78617474722c0026cc9389c3613e382c01805c08887579750155cc613e725e498918058f3b327dc5f88bb1dee0a8584ad7061fc8140e708f6da20122622478e84951c6a2af88d64dde5005308c6f5bc50c3bb6a6aec8ff25cd9afdce4d6b52164bec05748aa8baa16f11d7d4e73751bb8ab47bb200000000000000000000"]) times(&(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2f, &(0x7f0000000240)={@empty, @empty, @empty}, 0xc) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000100)={0x0, 0x185f, 0xffffffff7fffffff}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f00000002c0)={0x8, 0x8, 0x1000, 0x8}) 03:35:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="00001234fa4757"]) [ 470.318852] EXT4-fs (sda1): re-mounted. Opts: 03:35:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x80000000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r1, 0xb00, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3d}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}]}, 0x84}}, 0x4000000) 03:35:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 03:35:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 03:35:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x19fffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x5) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x0, 0xffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r3 = dup3(r1, r0, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c00854d69ad5241dd5543f6d734981d89bcf6cddf4234eb64b480ab76724ca3410d4778a17f0a9fd28302395c52e8875f1426174908c340ae58e721cb"]) 03:35:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, 0x0) 03:35:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) getpriority(0x0, r0) 03:35:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) socketpair(0x11, 0x7, 0x8, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}]}, 0x2c}, 0x1, 0x0, 0x0, 0x90}, 0x10) 03:35:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="747a2ce1bcd400000002000000020000"]) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/hci\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000100)="2244d4c20a70964df4ea808e09e551dc181faf57ac5abe398565861bac5dd33e970db84e2b836829ba582b6e1a011e41b05cf98e818f670ef322417c5407b3abcb0145bdf5b2b42aefb59daf39072d90f9a366d996f989739c0e1344bc4b1ad5d1da5f3fc90dfbc9a1890e411feed7610c8418a26fa5a41b5f9097f2f9ad066485609b17d27133080c938968c543d36b0e64"}, 0x10) 03:35:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000140)=""/208, 0xd0}, {&(0x7f0000000280)=""/71, 0x47}], 0x2, 0x0) getsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KDDELIO(r0, 0x4b35, 0xbf2) 03:35:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200000, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="811b9c924e59518524b8bb5334e520cfe257664e3b37f48fd384479c908801923204d2c68e4e0b362b049cd251cc34344164404adf5ce44c46d0bf0b240363740a4774c882bc5d9ce97e45e46c455135247db783c5d93421fe7d0f1c114776fae457ea201fc3f8c1011a5f742997f13b7862093d1dc05480481243d5d2af3a76ca003c7a8348be817bfe82c892579a3b2548afb7524ab0c01b56d2686c1e97ec19a89decd016526048653a573910e674cb57aa6075366ab4cbc4f2a4df9bcd1e9a13e0118b8a563b898935259b6abdf9ca7e2e381d9e17b69e54ee59cc00913e955d47ff62ea01d1ba4e", 0xea}, {&(0x7f0000000240)="50f822beffbbff8ac3a349f3a65466", 0xf}], 0x2, &(0x7f00000002c0)=[{0x50, 0x115, 0x6, "cb90eb41da94d3edb7615ed17db30ed1309a2b08f675f2684784d670ee0ebaf6c92fd72f24f09c27a97c0d95073da7f257f66e730855f55eb95e"}, {0x38, 0x117, 0x2, "29b1b626a749cd51e55ecfb1481c77872a35485d70e57b291241fe5e9aa8192a6cf04fdf83"}, {0x48, 0x10d, 0x8, "60936b484e3406e499a42cb377c1c4664b887d7a3cbc88f5ef2ead37741e2a378af622503ea2fedea841c6e6bed35f121d8242f071"}], 0xd0}, 0x800) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000040)='nouser_xattr', 0xffffffffffffffff}, 0x30) setpriority(0x1, r1, 0x9) 03:35:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}]}) 03:35:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) getpeername(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000000)=0x80) 03:35:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000ffe, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="b59143e211a0a36e6f755f"]) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) 03:35:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)) 03:35:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000080)={0x18, 0xd, 0x2, {{0x44, 0x2}, 0x3f}}, 0x18) 03:35:12 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x41) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140), 0x4) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:12 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x47) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f7573ed65725f7861747441be1148e201446baab4d33243aee8722c00"]) 03:35:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f757365725f85292e9b1c6a8c6dc650049195fb4c78617474722c00"]) 03:35:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) unshare(0x2000000) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x50842, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) r3 = getuid() r4 = geteuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000600)=0xe8) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) fstat(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() getresgid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)=0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000a80)={{}, {0x1, 0x6}, [{0x2, 0x2, r1}, {0x2, 0x4, r2}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x4, r5}, {0x2, 0x1, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}], {0x4, 0x2}, [{0x8, 0x0, r9}, {0x8, 0x4, r10}, {0x8, 0x5, r11}, {0x8, 0x2, r12}, {0x8, 0x4, r13}], {0x10, 0x1}, {0x20, 0x7}}, 0x8c, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000100)=""/85, &(0x7f0000000080)=0x55) 03:35:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)) 03:35:12 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x100) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f757364e2c74de7653e541fdb"]) 03:35:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10, 0x80000) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0xffff, {{0x2, 0x4e23, @broadcast}}}, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x400724, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000200)='team_slave_0\x00', 0x800, 0x3, 0xa73c}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e5c75736571689c408e7474722c001d45d2"]) 03:35:12 executing program 3: umount2(&(0x7f0000000240)='./file0\x00', 0x8) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 03:35:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x7, 0x3, 0x2, &(0x7f0000000000)) io_setup(0x5, &(0x7f0000000040)=0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0xc6e1e54c21ac7ea6, 0x0) r4 = dup(r1) io_submit(r2, 0x3, &(0x7f0000001380)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0xa, 0x9, r0, &(0x7f0000000140)="10ce393910b1dfb991d07a4caab648d0d006fd5a522322f881d989cfd47d877c6a261083", 0x24, 0x1f, 0x0, 0x3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x1a7, r0, &(0x7f0000000280)="111e44f1f759076c65d9a49c67a49f95895120dea160bf958db27cc0ca10801e9add3f375d4eb1171cf327a7d6a0f8545fbeeee4df700aecfb0ffb11d0928c5a959555c92d2abf05961f1147583c36d7475e39801f817bb99ebcacf6681813cd163bf47df0706145b8ef2d809a1995e0be50a1ce9146b9bdc83a134da3ff201ea96adf21c34d37d6d580373ebfe55f00b9000b7196d356cd075f3c84ace0c056ace1249d2e523b672da08b4b4d5f6f4b75e5055f491f8e", 0xb7, 0x16c, 0x0, 0x0, r3}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000000340)="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", 0x1000, 0x2, 0x0, 0x2, r4}]) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f00000013c0)=0x1, 0xf) connect$inet6(r1, &(0x7f0000000080), 0x1c) r5 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000040), 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r5, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x8000, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000840)={'TPROXY\x00'}, &(0x7f0000000880)=0x1e) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000980)={'HL\x00'}, &(0x7f00000009c0)=0x1e) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4a0, 0x288, 0x348, 0x0, 0xc0, 0x348, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, &(0x7f0000000100), {[{{@ip={@loopback, @rand_addr=0x6c3, 0xffffff00, 0x0, 'sit0\x00', 'team_slave_0\x00', {}, {}, 0x84, 0x3, 0x58}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'sit0\x00', 'veth0_to_team\x00', {0xff}, {0xff}, 0x0, 0x1, 0x41}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x30, 0xc, 0x2}}}, {{@ip={@local, @loopback, 0x0, 0xff000000, 'syz_tun\x00', 'teql0\x00', {0xff}, {0xff}, 0x1, 0x2, 0x60}, 0x0, 0x98, 0xc0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0xfffffffffffffffa, 0x3, 0x1}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0xfffffffffffffbff}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) write$binfmt_misc(r0, &(0x7f0000000800)={'syz1', "20db8270e3b0040c5298bd176c278ce364bc2929a907c32eb065f2608ebe42"}, 0x23) ioctl$VT_RESIZEX(r0, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getxattr(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)=@random={'security.', '\'+-\x00'}, &(0x7f0000000940)=""/29, 0x1d) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000680)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000080)=0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000780)={[{@nouser_xattr='nouser_xattr'}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, 'mangle\x00'}}, {@uid_gt={'uid>', r1}}]}) 03:35:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0\x00', 0x0, 0x22001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f757365010078617474722c004fecf28583315077ab8c4921f3630fa3cf685774bb5982a48275e8e53ce2060065f83dd4c93678916ee05cb9f6cefe"]) mount$bpf(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000140)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0xff}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x80000000}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x101}}], [{@smackfsroot={'smackfsroot', 0x3d, 'vboxnet0vboxnet0security\\!\'-}^$cpuset(md5sum]vmnet1'}}]}) r0 = socket$inet(0x2, 0x80006, 0xef) sendto(r0, &(0x7f00000002c0)="4bdc232558e8c0778b9fc0bbfeb06dab814176943b53d516ae475cd466987b8e45ec2db83cf0e56bc3a2e11090fe664f6c74447df0084ca300d9ec3149292b2f91190a6f0c9cb12f5011c4d1d3a274db1c0dc921777423e65c16d178343d20d1b10220d2e49d49e8389a083d719ebe6aebb99f0b4e68899971eb95aeac4ecb50a31aff6789d25f117ea46ad7a6f2b3bcff9ff70991ecfc9bad7b184ddb66e50526af50014c8836e37c8a910eb99b0c4ad0f8451d0a78c90bc4c7cc40db870e4285df2fc472ebeab97bf95910a5668f3de94e29ddd2f5180d92d784bcc1822041940f444a73ce98f1596751fc4dfb867afc3d79edbca34b0419d7237dc8", 0xfd, 0x1, &(0x7f00000003c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x80) 03:35:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)) 03:35:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000100)=ANY=[@ANYBLOB="d75d3a58b462b6dff561315e6b3ad2e2c249618c544385a7e6acc7a19503efe9b2e4180e03ccdf218f228d321deb7efc6b21c47d5c66e13ccf5bb0150af92db21eb34c7499cf75d2694dfddc814468adc53e7709d8b2edc7619de655ae5393b177e8151f33b0e58422e23c55370d304675c2a266ac4220796598f84e459d4d423979bcd558055752d354ebd8681694236c6376117a6b1e39181df1809e957f827e63170d1fbb1b98a11874620314b2133b40"]) 03:35:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) accept$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e) open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x1) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='r,\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 03:35:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000040)={0x600, 0x9903}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000280)={0xff, 0x2, 0x6, 0x9, 0x5, [{0x3, 0x2fa, 0x5, 0x0, 0x0, 0x1}, {0x0, 0x9, 0x1ff, 0x0, 0x0, 0x1400}, {0x9, 0x5, 0x7, 0x0, 0x0, 0x802}, {0xb1, 0x5, 0x10001, 0x0, 0x0, 0x400}, {0xffffffffffffff01, 0xfffffffffffff961, 0x40, 0x0, 0x0, 0x80}]}) getsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="646174615f6572723d69676e0672652c00"]) 03:35:12 executing program 2: setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', 'nouser_xattr'}, &(0x7f0000000080)='!\x00', 0x2, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r0 = dup(0xffffffffffffffff) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000280)=""/180) r2 = request_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='proc\x00', 0x0) keyctl$get_security(0x11, r2, &(0x7f0000000400)=""/31, 0x1f) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='nou\x00\x00\x00\x00\x00\x00\x00\tr,\x00']) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x200, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r4, 0x408, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x41}, 0x4010) 03:35:12 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x4) r1 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000008c0)={0x0}, &(0x7f0000000900)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @remote}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001b80)=0x0) r8 = getuid() lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001c80)={0x0}, &(0x7f0000001cc0)=0xc) r11 = geteuid() getresgid(&(0x7f0000001d00), &(0x7f0000001d40)=0x0, &(0x7f0000001d80)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001dc0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40)=0x0, &(0x7f0000001f80), &(0x7f0000001fc0)) r16 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000002000), &(0x7f0000002040)=0x0, &(0x7f0000002080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000020c0)={0x0, 0x0, 0x0}, &(0x7f0000002100)=0xc) r19 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000026c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f00000027c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002800)={0x0, 0x0, 0x0}, &(0x7f0000002840)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002880)=0x0) getresuid(&(0x7f00000028c0)=0x0, &(0x7f0000002900), &(0x7f0000002940)) getgroups(0x4, &(0x7f0000002980)=[0xee01, 0xffffffffffffffff, 0xee00, 0xee01]) sendmmsg$unix(r0, &(0x7f0000002a40)=[{&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000001c0)="dee9199c568d49c9889dcc76273b6f4129c0cb3babcb765efb5f2ac2fd8590187b7f254308afe67c653e87278b63f9da9bbfcbe91992fa41eee6a88f345b12894797f6af562321168bcfeeae2ce06007d514193419ac10eddafa0a9d3d1bf396baa634db5a965daa57a9cca27b410dedbfa045b218658bf15b04a2a941b4bf9226fc9e92e0dafe851b45d7b72a4f63c31f00a793e125d19eacc557633a2b0405f538ed785968c6f5fe419bebecb168cb3a61edd8ef9048ac3e13de7f4a", 0xbd}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000000280)="6fffe1b2cb9d38b30ad1e24537e8bba24d00ce", 0x13}, {&(0x7f00000002c0)="5a66751438b9fada9d24", 0xa}, {&(0x7f0000000300)="59e5552fba5171ab52e87fe9a8e26f9969dd45115c6145de670f2966cb6d20598788c5d4f59b34f914dc6d0d633bcd3bbd23", 0x32}, {&(0x7f0000000340)="0d288280724d6c4e70135e10ca117168", 0x10}], 0x6, &(0x7f00000005c0)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x50, 0x44}, {&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000880)=[{&(0x7f00000006c0)="d18b753649a038eedfba27fa1e8abd4a5d7bd09caf4e9f499a4638f7a10801a5eab23a82f88179861e8071a6090d6801a240590192f0065b111b79d841063651a759cdbac4803b6c71fac26e5c1e9c2987587285238ed64b266273ef795b49000fbc4b3a7ddc1ec5e80aa6f8d6c314a9067c895df835c635d617f563b105648c", 0x80}, {&(0x7f0000000740)="d881a6b63827f59749d12af41a7e0e978e1c7348da06705ea8f34157", 0x1c}, {&(0x7f0000000780)="4eba3eedc8107e3c373828be8bd76d96ae0bcc1761ae5f341c368de6c0131c0383c85c00ebcb6462", 0x28}, {&(0x7f00000007c0)="6c989448c1dab276fe6c6bd72bd087a0d431ffd2c9c736a29b5f5b85be58d1d14e41d1cce6332e86e2079aa8049d1950fa09921d8285e4a1cf60d701c7e202127fecb8811b829361f201d9d3f2849dc565557f2cbc993aa73f05bc666c75477b3b15351b23266a7b47f3c8a5fb75eb25c30bc828cf3b08a619b7c130e19d00fb957656d371c4a83e8f515f80ff7cc83d9000549c72dadafa241f", 0x9a}], 0x4, &(0x7f0000002140)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}], 0x158, 0x800}, {&(0x7f00000022c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002640)=[{&(0x7f0000002340)="c75c1f0b9b6eeeadc6ac1547f9d28355b5981547e148a70d49767d301aa8fa9b52fbda5dcf6d0e89299a6eba56212d6efbe6c33044aadcdbee1f33dc824f8c44749288b9a14255d090c59d744253e9c34d7ee72e6d8d4b3c3bca727421a5729dd2a23503ffbaa387b6ead961abd6b1d9abb58232e8e410a40c8bce730b6981e4dc9208adc403188eb25c7af8d30a38f95a5514722654731e5cd979", 0x9b}, {&(0x7f0000002400)="00a613b39d6991d4b84ce7642e4bef25e164f0463564c01afa270e863a", 0x1d}, {&(0x7f0000002440)="591b11718629e6e41380864c585b8dc7ecba075bd6637a6456f2e5e03744357d7bbbee5be260931510c1703bc1cd6adb67f3ad6c498b7b69d5df893c9a5ec4d47e1088043e212c117fea8e0b00c69dc7f29e96d1ef3c8e20538f7c2784170edbd495d4a151976363dc09004a4f51239e46bf01a87b071a68a7b5c92e56d527cb68a8a9101cde536b", 0x88}, {&(0x7f0000002500)="e1e7d9d8f83ab1087f5ab088dd4afce94787cd55df53e458c3d5ba9f323689cb8c29", 0x22}, {&(0x7f0000002540)="6db02ed2f7d175da949dabd6fac29878c895f7f147f28dcb51b651c98dac5946d0ab6bf3f3f10101a2d8d1158354095551808fe169d4039d0f02245fff5c8151d005b28f5ae487f4fccbda21ad910d4e754ce61372ce3ae84967319987fe687fa1d77ab8b800e57c61a9c5a8096d30d61bdd41c8b90eff171a79343bfabdfb0a67393ed9de1f8bc4892c15b4b98805db8956a3aa0514cb648a9309ea71eb", 0x9e}, {&(0x7f0000002600)="64bf44537429e0806a948b64ab7ccae88d61dd48cfca240448fc5dfac426305d97e4ed748cf5", 0x26}], 0x6, &(0x7f00000029c0)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @rights={0x18, 0x1, 0x1, [r0]}], 0x70, 0x41}], 0x3, 0x20000081) geteuid() r25 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x4800, 0x0) setsockopt$inet6_tcp_TLS_TX(r25, 0x6, 0x1, &(0x7f0000000080), 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='.cpusetcgroupsystem%lo(\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='%\x00', &(0x7f0000000180)='em1cpuset\x00'], &(0x7f0000000480)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='cpuset\x00', &(0x7f0000000280)='selinux\x00', &(0x7f00000002c0)='+@\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='selinuxGPL^posix_acl_access{md5sum.**)', &(0x7f0000000380)=']$\x00', &(0x7f00000003c0)='\\\\^\x00', &(0x7f0000000400)='}Qeth1\x00', &(0x7f0000000440)='\x00']) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='nouser[xattr,\x00']) 03:35:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x12f28e33c89e3f3b) umount2(&(0x7f0000000180)='./file0\x00', 0x4) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000140)={0xa, 0x68b}) socketpair(0x9, 0x2, 0x52, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'bridge_slave_1\x00', 0x1}, 0x18) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:12 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x24000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6a6f757365725e78617474721400"]) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x80801, 0x2) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 03:35:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 03:35:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x400, 0x1, 0x100, 0x2, 0x80000000, 0x1}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8002001005, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="643f53831d7993d06362025660f5bcd000be6174615f6572722d4f7265a5202085860a8d"]) r0 = socket(0x3, 0x80004, 0x6) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x1d, 0x4) 03:35:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x1000, 0x6, 0x1, 0xfffffffffffffff8, 0x0, 0x6, 0x10, 0x1, 0x4, 0x0, 0x8001, 0xf65a, 0xd3, 0x0, 0x7, 0x4, 0x5, 0x6, 0x8a9, 0xff, 0x8, 0x3, 0x6c0, 0xfffffffffffff801, 0x4, 0x7c0000000000000, 0x8, 0x3ff, 0xffff, 0x2, 0x8001, 0xd7, 0x800, 0x0, 0x9, 0x4ef58c3f, 0x0, 0x9, 0x7, @perf_config_ext={0x0, 0x2}, 0x4100, 0x1000, 0x2, 0x7, 0x26a, 0xee, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x401) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000001c0)={0x1, 0x7, 0xfffffffffffffff7, 0x0, 0x10, 0x4, 0xb8, 0x2, 0x8, 0x5, 0x1f, 0x4}) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) sched_getparam(r3, &(0x7f0000000280)) r4 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000001c0), 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r4, 0x29, 0x36, 0x0, 0x0) getsockopt$inet6_opts(r4, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:13 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000180)={0x3, 0x7fffffff, 0x80000001, 0x8e6f, 0x3, 0x7, 0x5a, 0x24c, 0x6, 0x81}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) open(&(0x7f00000001c0)='./file0\x00', 0x20000, 0x0) 03:35:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = getpid() ptrace$pokeuser(0x6, r0, 0x4, 0x40) geteuid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x800, 0x0) accept4$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x80000) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000026140000000000000000f3189edf7710d7624fd94acd97d32041f4efa3a8e793589e2a7bb3b5b3835867be28210269455ab24b8c56f2000d9368e9637e6983667c04fe0b13063fa0dd7869cf7632553bdf6373357652aeb90bdafbb07aeddb436ff4431070"]) 03:35:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', r1}) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x9, 0xfffffffffffffeb9, 0x0, 0x1020022, &(0x7f00000001c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}]}) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair(0x9, 0x1, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x200, 0x0) sendto(r0, &(0x7f0000000a80)="f7824cf13f8c362a5a8ccfa4cc005f3cb0b9f5234fbd781e59b38a7ef3c2c73de3098c6b8bfbfc5abe13856bc1912e9c6cf0c66ffbc167abed5707075035ee9ae4ee72c40aa56a75e4a5f1e79b4922ee598b0efa57488db20aa378d6ab72ce4aa37fd207f9bec73e5eb3e300de94679f56990aa876adf0cef68d17bc7259aedc2262e069e649e987ba19ece98a3ebe06609106ab6b1fc0b793d98508eef966b9c748280c1fcf230e310a6d2e28040fb59afbe7c7eb44ecb7dea3fdb5f8a96dcc235de6edf719f2117ad7a79a1c7511080c8a220df24d5b44c02fe2df31bc561ac0f8bad7a798c507889d300dca8acce7bbf28b426654a2b1d0dff7fbe58eb1c2afd86b589e6c54690a23f6f4023284686b0363b1ed62b6319f8b67bb212b6a09df67bcd42c71131f3c4ee452e78dadbf401bfeac6ca97da75b6170381c8efade652542e6a019cb213126917a36b3d148e5dc238322af9937229126a780dad05ce17d109a5a29df34420ae399fda6144412dd76265ba206d4569d91c30f26e267db85faed362b9b01c084b01aa44d807d3330320d41b145e76bd72f78995db417d274aba53cbed7749bef63c876166a72b47d69c12070ff006c767bf60b006af1f271a6546943c58507b40d26d594482b346758ee40993335732fcca95f28bc00dbc6e2aa51dcbd2476a8a1900b35206bae46b58a6e6604b97458a1084f02f9dc21de47c1f2a68d9adeed33200c9c3665014ff23f4b03c53d9f77a5d928ce9e0afdab57e6b443c3ac82c3ca086e83800f7a11cdc17a4c9298a6465cc67724e3dfdcbaafcf10cef6c26dcbb812e084fe9e0bec6310dbd8597cd284f766377d42c9cb32ce631059d9f3c4f235f3a8df178116d7a15f57d34738e8cd88d65cc4e3f84d9e48022157fcc5e8db0853553dc24e57a2f5f6af9ed68858c88b014f92e7646ca5f53db3ab262a8d5dbecac1bb4c0ea3e16e02eeca71e11813c50e3a45600ef287846280e8af5eb35076598a72a0c18bfc191c025a12bb121f717f7f84716b8d15d13f382920ed4e5f1956e71d2e1d91e1724ec9129451fdfcb0908a72eee8b3d652d55a927435c4e286ca0d5eb793d809a63205de5e6c3ddba22bca79695ac3e83de9593d143f144612c24e39d6ab9420b84a340f8884db64a2fcc5c49e410835e9755a3f531b36d7542651440b9fd268fc1524b27fc6a165c69ea09147ad777745027c2f41639fc978f998bce5adcd2ee4bbc6c68a797e2bad571e12e8f7e8d2abcdd16bf38487cc1f6f63098424144c4ab4ac9fff5826581324e14f1c28749988950f7ac007afea43c2b421dbcd418f2918ec4ce349bbb4043fa592172d8bb37bc92ccdffb3ebfbacc2b44f8972ec69aedf0586bc05fb451385806cd97b4785ea4f489d5bd33fc33915cd0001a49cc02312f07d118cc57ed7b2b39c3501913d86ae0da0872f4060c427a6f5e4a3651d9773455993e1ab3fd891ca774fa9047e5e1076cb6466214b0278c013a59ec11bd77d838c72886fe0ef71ea0b3ab17277ca0926f133fe2c7df5ae31e62f4c88bebf57db5ef9c873d8e0a3294a202d7d1a29eebcb14d5db4d585d23bd7f749fd69b69005416ce1da44a2a1c737c6e358241598fe89720d3c48341cda9f226308b693251a640399cae493979447e961dec31b5a83a2616c24df6bf3a9dfee2815d8aa636e68f7928ca6507b3ff7eba6000ff23971c53fa83bf1a7ad1ebc132d042d13d39c7306e78174d109879848d711356bcf36024ca4e0049969c342bb301d3c7b99ee1e26b49bcbc488a7b5646e4992fdd6be16a79ee98449996effaad8e3004074797f829f42066ffe6c0603d62be980175bf4b84631229962046a39daa61d9b606a8986768592cb82fc317f32b3925a0fa6a37ac1e78936d78f1929cc92e4c6931cba4331fbdc0d802020cee322db931aea5093bdaafaa2ed02e0ddf837244d2fcd1b1e8a395601504ca431ba313a5310ce1a818027ed06f1db9ee35a03116f49a7870d4e72df45f9e079e12b98f22bee646e7f3a711f0ae4dba0e6bbc9dbd93f0d036903d1ea7d0c85f08c659f5ada2692afcc965b05a0e93725a4b9d5e4cab800fc3fbdd3e948c6bf07b3fc00b0fbe43e8ff78eb3a0e435120bbd5c235bea176f355a73fdf4297ab9e06b2fcaa6d28b14ae26d59ede8d79aa8382a6fd72aae922a15f6252eec3ee2b852d368b5ec96c4278326e9befc8234ef579ef3fd9c8859e18f9b48c45a819cfdee68060916de3fec55cc639bea79882fed61bf2d7a44a8cb82f4040bf3be974c41bbb091993d334a3ea8391bf04b47504c43300ba4fd9737d313ffc828b6d64518ae2779534c3fa31813fd63ccfc263f142f3d609b7d69d41a2f160175ef1fc154f55d2ce1a953adb863acb688d76df10c56ae95849074c5e36f31251c3332efcce64d6f3c996f15a611dd957bdb8e37d3989cf56ebe068fe90a6dbfea66821fd09fddeea7cc942730a7b0608052366e26bbcb294d615494129c2724638787cfb6d9b203eb66dbad1a27e5268e7d25aa7088008740940f30b41b27cef59cd70962983b5f0ac1caf62499b53fa9be2ab3fb332649f3166e04960b4e26cf84fbc96cd8a24aba9ff87eabddab825af6c5b8a0f04bcdb2a5c01247af892fe474f4de76c1fadf0ad6361335619c48958a9e91f9dfebb4a8e0d52b6422c8900be70ba79dbef1c80d1abcd2cc4636195e590d79d2c310012f69e4d81a806d1a2becbf4e224f68530185e7a17038a7a96efed0b25e1e23a986237507e0d8117d9e9ad97aef3e8457d723457e01be1edb43ec5140cf40588232296b10fe59b74dba7095d15376bc42266bafaea7fb893e1ef810604580d0f4d33245150c17d5b4c01e59c480d04aede823b83c97c9ae27d2b131963b73777f97dc47123d57369d0746dc2e70da7dbe29b9cf0bfa19db81dd890f3154fff6780a9ad18ee201d849cc05bea5e3cb3e25f836ff5d7d81454c6a20b5b79f3f0e50fc31835e25dbacee1a0684cc7badaaa8f663f0a28fa18d62077f2d2d08d6a9258d9d004c196a9078878842f1656295c85b6d1858524dd1c52240c6633691bc9e5066fc3c7e050a90aafb46ebe1e8cc26ef6f464a947e1c5793a41cacafe17cd2a7ba416a9584349b68063b227e1ebfbce6c96da3a019e401b8d5fb25be1f4a29556e6b1891f18637922a3179eee6c9bbce71dc8324ebcd7439d0afb9f080e747cf903fb9ddcdfd0f2d3ec97555a2adb2ae36e00d78a8de5e8c2e1f562b2f65cf8e5cf99babc8eeba5b1590fe8c78d2a408f6f1ed241afcb278958eafc71dcfdc7c3049b81667c9b5e85f98efd132de9e44aec20236a272589c0273d551bee47b875cdb11e9a4a5b8c3f1f07c915132f9c7c7dead761af22b6b4fa0f5448c24eb3d05a4a4bda760830eee888fc53435b3f7489324e5ceaa3a36a23c4e248bac88eeb961ae639074a15a2e0a333be8ec772e58e5a80a2997658760b3f7dc2db68eccaf818dea2dae00dc8882936e9ac077b8eddd86dc21dcca25f69834f259c358adbbf4d1d678b9fff8b48d98e4bfe747340241276ed81ad4809f94144d0ef7f915b349e7039205e960f91ed1f968e3f8ddb731bfe275676bfe0df12783894c23e6134ec0d59a166cf965a8fe94af874ce2c3dafb49baa432a6ac56504ed4fb04dd7407e046db58a7230e66d226835ff6481bdee1a3afa5e8be08bfee60a227a1d089b3de1a0c573276f5c6f4a59cacdcaf4f9962db87cc886a05982be008c0dad60eda1bf4bcb80972377e11dfc23a5ea4fc019ece89293e1c1e1fdd7fbbbc404ec8d78526ce08664fe548200962b1a4cfde16ef3fa8eceed20fe599623a39d8a8b1a71b73b717b16c1c2d2f9576c6acf2cd52012f779fa58ff9a59b6a07c04e14c929e6e16caa544268f7fda788222eb5b604572fa84dec30bf17c42a914e37be303ecf3c7968b5cfd77b85fd1925e7586c0dee652fe9998d8d95ceb3764b9ba31f11d7342710cf6239306f36433622fd43b6feeab9abcf42e48b671ddec8dcbb5dec7ceccff2365cd82645470890c976aa073cdc045f9277d2c867630ddb1f8677c5bcafa0aed327878e15810e64c5d8b0873c76f86ae360965bf2141b5c2b2998db353bca42279dfaf41494c2acc9d1c7ec0e36e16f209ef0e7352f9faea68efea42806984f119db4fdf1104e49f0ef10cb0e37a926a478b3caa9defdee38f19aeff093e551b0d0c27c76eaa53401a0875f2d2675e282f10d1171abca6203a297620fb89ffa9e8408897acfafbbb796a7ee1fa58ba6d1068eb72c89540110e8276477f7a459980a4ae253ad17087c9093d848f8c3def02673cf57a3a397f286d9f9e80c0320c6121011046973edf47980a5fdf900f136c60a7e22c9099be3dee2258d67a4b99483c08d6016f525fcdefc754b4507a482c5f0fc63443f01a68cc0910aced1edc09b96b4c1c046f6a8c6c827b822170cacd118bf119ecd324ad917715cd69d6554490994e0919b684eff048414ffdffce8d3f44b42f99fc77a4de9a832e98f98923ef5d30dc88f85e6b26de057c7bc810d2a4d936e9337f01a7aa2eee50a9edb9daa4fb860367bca8d888afdcb88606dbbc678ee6c7fab700a008a9353d9de7f54ca6f2ee133e629170fb4363098d1de16bca3e5f9268be00a806e3d14ddbdf1e6b65eaeb08f3af8c0eeff069410e4832b97ffe4549dd6ffb12e37af4c0000753b0c43a364ce7a508abfd8eb296f9ba8b0cfc7ab8b1c29c1f2bda367876a936543afce0815bafb384199e3394535a580fa53ab84a801653cd43d1dcba1b4bdcd745a4176e97c6a165a128aaef62ab86b7b4e315568380bd2a9c7e89f5bef32e67ed60187e554d4f02f9e80066c16726ca848d460b2cf5a78139cdb7170e4e20659c0fa49825b8a594e244516743739220074f76d361b939f1c6e881a9ff8768fb884a863146d080dd8db01ef65ed65723c33f631dc8b92a6f41653c02985da880bb6ca8d832f2c7541c1fc88ca4548ff0e45a1a44e70e28ca805b3dc3cd8e7f36bcbba950647707ccf2b5b6c64bdf4626aaa70f87dae6d73fa6bdeffaa79729563ee1466cef9c1e890388d54d5b1e29366481db54f2f207e031221e893b96a3a3cc949327b2ad7e158aaabb31d1301746bc256ea8169cc0c1078fe5b30f99f4d9b3535ff21cf19d1cd780566b47583ade3f829992a9d046cad340c72ab095b7e8d9b5f35beec16005c2a6de6986cd079bc79443440fee0b8cf11b41d7e00c016e078c64487a7e55747101216c6888964dc4abd5d8dc15d30d60eb55fe55624f9bda729b92d7d124c65d486404ca7051350c133ba01e1af42d6e05c6eb60342c9cb35d8e6c377e3e195f8aa78b00982b35c00020d8712f6a6c32b7a2f6259dddb3e0418bf6cde06d94f15e60ba3f959e51db95f19383e478af7720a3076f389920caa62e13ef978fafc75699a880ae73e5bdcdc70e67a69cbe91adbe13eb431375dc566fef92548377dc7586281759770e6d0af4258f70ae261b6d7c080db14e82aba611769bc529ceb1f8f926c157cbae58b198a8d08becb0005275166c4eaceba279b8e6794fd9f1c861f25d246b20c3e4536da51e8ae18cdff91f5413bc214197a8169ff3c273252a25b09432381ba6a9bfd7e45ece4c98464dbc3db74460dcf2dc1a6c9f7e7a74360bdbb7a9db1a037ff0c81f1395fbc045e73e22f7f9d83e96249290ed6d1ced166f6b875386feb029fa68bb61deff78e717a2b5d920fdc8446498459017c4", 0x1000, 0x10, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x2710, @host}, 0x80) renameat2(r0, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}]}) 03:35:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3f, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r3, &(0x7f0000000140)) 03:35:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r0, 0x9, r1) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='nour,\x00']) 03:35:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0xfffffffffffffe9c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0xc) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0xffffffffffffff1d, 0x0, 0x1020020, &(0x7f0000000040)) 03:35:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}]}) 03:35:13 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x212805, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e7d757365725f786174229f154d3374722c00"]) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x6) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f757365725f7860747472e900"]) 03:35:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f757365725f78617474722c083f7bc600"]) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) 03:35:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(r3, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, &(0x7f0000000140)=0x35d) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000001c0)={0x7fff}, 0x4) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000040)={0x8e5, 0x5, 0x1}) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/member\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='vcan0\x00', 0x10) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6f75df1e110400006b533d65da181b6e2f127365725fffffff7f000000003121eb07e113dc68232ae169fdf71103599bc0d12222bab294dec20e8ce79c05c22155bf70fcd36be3abe08d9f09a4624726be7203b111432723383a5ecb5edf2af15134ab5125030fcec53b211ef6cdf797367c88e942cc1c18d7e8e227523f7d63669f9958"]) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = getuid() r1 = geteuid() r2 = creat(&(0x7f0000000940)='./file0\x00', 0x4) sendmsg$nl_route(r2, &(0x7f0000000b40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@ipv6_getmulticast={0x14, 0x3a, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004050}, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(r6, 0x400454cb, 0x1) r7 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) getresgid(&(0x7f0000000700), &(0x7f0000000740)=0x0, &(0x7f0000000780)) r13 = getegid() stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000010001000000000002000200", @ANYRES32=r0, @ANYBLOB="02000100", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000000", @ANYRES32=r8, @ANYBLOB="02000500", @ANYRES32=r9, @ANYBLOB="02000500", @ANYRES32=r10, @ANYBLOB="040003000000000008000500", @ANYRES32=r11, @ANYBLOB="08009066", @ANYRES32=r12, @ANYBLOB="21b8a313537b47df01f3e47e08000000", @ANYRES32=r13, @ANYBLOB="08000200", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="10000000000000002000070000000000"], 0x94, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}]}) rmdir(&(0x7f0000000080)='./file0\x00') 03:35:13 executing program 0: r0 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$setown(r0, 0x8, r1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) fcntl$getflags(r2, 0x3) open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x4) getsockname(r2, &(0x7f0000000140)=@alg, &(0x7f00000001c0)=0x80) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) getsockopt$inet6_int(r2, 0x29, 0x19, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)=0x1f1) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f00000001c0)={0x13ffb30f, 0x3, 0xffffffff, 0x1}, 0x10) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000000440)='y\x00', 0xffffffffffffffff}, 0x30) prlimit64(r0, 0x0, &(0x7f00000004c0)={0x20, 0x67}, &(0x7f0000000500)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x42008, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x402, 0x8) r2 = openat(r1, &(0x7f0000000540)='./file0\x00', 0x4000, 0x148) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000580)) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000340)=""/215) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80001, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00', r3}, 0x10) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/191, 0xbf) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6f6f75736534f200000000000000"]) 03:35:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0xd00, 0x102) vmsplice(r0, &(0x7f0000000300)=[{&(0x7f0000000100)="33479bf58d351997a04bf76177c228417dfc427b131445d5541caf8a77cb49bf0324cda3fecf9f66215b42898ececae54d43753fe873170c59368cd71d425ca9fe9ec2b7b861896323c8158f84dce324781e43ae5f621e1689a1601b0d9239effffa8fad2f43d309126cc7f1aa0db0d2717a66bae54d868efc9265f814b4b3b82a3aa9d9c94f37c11eeeac775f2b6d479dce41ac6bb9604ea25fbfb03eae3faa5863f7b6f886b27b51066c91e367dcf1065ee9a84b3160bdb28a773bc47072e06e6cfda4f3d2270a4ac77e", 0xcb}, {&(0x7f0000000200)="e9691218028f2e3213ee466044233f1415f0764ae491f852c7c6e669ecb8f1463bd49a80cc763819c0890b10aabf4d9580ba1ead5abe895e5efe98b6a179db7ecb3b0e07f6b3d73ec485df2bd51fa1f5fdfc589594c00730eb52c649c789f3ff72cb44a0a78497598c22eb8206468ac0f0b6ec2e5c75b5043f69e3d2fcde4cc2488db47c59cbb3e2c81c535fa734c747a51390cb5ba889787e8c459b3ffe538493ef01dfc105d0ecaf0ed8e8403d5173705c665b96fbcdc2b5a9b9ddfb", 0xbd}, {&(0x7f0000000080)="b70c53ea0bccfc8302cb9fe0fc385efb302f69f38eb1a93f2544f982ed5fb9e21087d017d5", 0x25}, {&(0x7f00000002c0)="cada9f8a40ca5d4246", 0x9}], 0x4, 0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fchmodat(r0, &(0x7f0000000380)='./file0\x00', 0x19) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) fchmodat(r0, &(0x7f0000000340)='./file0\x00', 0x8) 03:35:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x417ea5cf13868a52, 0x2e) recvmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000380)=@isdn, 0x80, &(0x7f0000000400)=[{&(0x7f0000000a80)=""/4096, 0x1000}], 0x1}}], 0x1, 0x10000, &(0x7f0000000480)={0x77359400}) getpeername$unix(r0, &(0x7f00000002c0)=@abs, &(0x7f0000000080)=0xfffffffffffffe42) setsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f0000000340)={@multicast1, @empty, @rand_addr=0x9}, 0xc) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='bpf\x00', 0x101000, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0xffff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'nouser_xattr'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@obj_type={'obj_type'}}, {@smackfsroot={'smackfsroot', 0x3d, '+)'}}, {@smackfsroot={'smackfsroot', 0x3d, 'nouser_xattr'}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@measure='measure'}]}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1021020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) epoll_create(0x9) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/validatetrans\x00', 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x4) 03:35:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f7573cbd5ceb4617474722c00"]) 03:35:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000080)=ANY=[@ANYRESOCT]) 03:35:13 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x20000000) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x7e, 0x7fffffff}, {0x0, 0x4}]}, 0x14, 0x2) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x2) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x1, 0x0, 0x0, 0x1020020, &(0x7f0000000140)=ANY=[@ANYBLOB="646174615f6572723d69676e6f72652c7569643cd6", @ANYRESDEC=r0, @ANYBLOB=',fowner>', @ANYRESDEC=r0, @ANYBLOB=',dont_measure,euid<', @ANYRESDEC=r0, @ANYBLOB=',fsname=data_err=ignore,\x00']) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000200)=0x8) 03:35:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f45bbcf9a5f78617474622c00"]) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x11, 0x2) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@ng={0x4, 0x12, "a94daca2ee13"}, 0x8, 0x2) 03:35:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) write$P9_RLERRORu(r2, &(0x7f0000000040)={0x14, 0x7, 0x1, {{0x7, 'wlan1.}'}, 0xffffffff}}, 0x14) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000140)={0x9, 0x9, 0x7, 0x1, 0x0, 0x3f}) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6f757365725f78b98d44207387617474722c00af88c6b322fc0d5cc7b5d4a3f01d0792a5e890a684f7c3d12b97629d82999b89d5b83d1f644c7d147fd6b9660191aa8882f4528f5a07c22498b09a8eb783cea2e5fd336bfa9cf4d43a8a226532b8ecf2b3f63ad69f4eedd698320700467ff56d8c8435370e64a7d869e0d35be1bfef1240786df0a01ded74c103624cf125f3737ed65a6f4e0b8b63d6b6f0e0daf7b6312915d1523cbba04513cbd883751ea971c86ebaa03cea1c134f635614afa876994976819fadd8524e1b6cf28d14cf88"]) 03:35:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) getresuid(&(0x7f0000000540), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x7fff, 0x4, &(0x7f0000000340)=[{&(0x7f0000000100)="2524544813886534793f5567f0", 0xd, 0xbce}, {&(0x7f0000000a80)="e01e798f74c947e86bb270a8ad11cbaf6c9c0038b3b98477e0c1d6570ffc0730ec6d78c54dbd352aea5d412ca9a3360aeb8794b015f5d7eeb1af1c1b5b2c5934fb20a27f3f091e3aeead895e7fd53e7a452da47f21490bd89bf8dc5aa2190ad4c893fa69ab999c84cb024a25c55359943d6a6214f4ece1b8a5924f9ea721141c717e1ab63c678836ba531a1961923e547162fd8ffcd345edfc505084ae4eb2e2dc2401dbefd9833204e156a7f5a13b853ae837c8ba56af75a8552b6692559b492558f17f84e2d3ee446595f0ef4aecc587a3ce5e486a7a131845e03b9829ba10fe555fff0518c752afed7935d890969d2f08f80abd6d7a8fc4bfce63798d0d0b5294322166efc0603476262758065c1c31ab7bbbd67caca07c01ace2dd1d9d437506f5ba761d312860664f0cf6541f29e04e3e41c3b58aafe385450612af18ff0b93afdaa11278df14b8285e5b46a1e7ca23b87ac0c98b285e64fadc76a4c99fb60e6e7d952d2c27bc21e1ce170a87cfd5d0f74f8cbe816997c598ff166ffbbde9da6b667598b9ffdd6e26b51172307ccdaa824e3af689bf87ff12664ccb2dacab5a048c7c27147f40f8956bf6cc75cc01c7055f696bafd2a4ebe224215e09854659df2751de6682bc1712fab465fe916fdc218ec31bf5a171043a0543c1b5083756afebb6060a55ae98b4c509a80901c517fcabcebcc4dcf5731aff1dff244a0db01d3a2a66bb2731b3d396b9287367a94d8525f47571202439b6623a344dc2991c8289d08efdf5b3f4e42ce30f1f8fb34f54012dddc252a6123b1403b387efc3efda7c535fec98d507da8d1a9b144d794ae916caea72f39d3246541bee38820644b32c4307b1f7dacf0da7ee4254363bb646223719a50ce99378f1cb1f3b743d4d96450cc2e96bc6d9f141a34d79e7447d8b815c4d876aaef98981e26aa72c9d6f29c2575831786c115d913b8a4673da4fd926d58800b0781d52378401a03d60fc31b1f805ef7ad5ef11a8787bf247f0a86dd41332970b150bb6ba1cc9816f0f89925ef64b51b0f58b1e9c978215266a35e6abbefbf307a6ff1d6313bb8be525c7f3eb8552eec9be4b1b10a159855e334479d890dadb647c5c1a65eb557198c09bcd0a08c764b585ba2aa6ad27fad465677bcaf34aa1163b93307d569d201ee5134f591af430713f204814a59950b6f7bbfa98eaceeeb158a46a541b27a767e1ab6c4f058b4aa66ac4599e5b770a6a2e820089a8efa72df886b1eac48b86c93c3070bc4068410572389f6e45eb491bc27b8f59fb9772ccf10be004f0bb4d857af3572c93d42c9c22d758e5c88451715055eae98be38090dd66eed4360529fc8148cd6e5302b0bdd159eb69420bd0750d584bbd6f796f863f6dee28187338db215b0ee36dcd31747a3cc1c72c4c454e1a92d8cd54800bd9b007f16a67c42ec1816ec163d3d37b34ff3c6a132f89878cad2b265c56342493b5a16f3c6eaadecbb8136bcbb6f75c987c8f57cecaeae6e174e1299025fd69d6bac0bf6e67632f312b145232d1fda050aeef583926609ee536e1be1e15ded125e55a1f6513c9e45e6715f524fea5f51f642b3b247c8e8f50b567d160c477ab6fe0212794d3a83aa487b00bd018a6e55b22ddb294fae41b391990329e9a02bae817ae4da322ccda0c0b9df8e2b8e73047d3cc99faa00509c6cf630a221605c8c9ce692b73d3010657b503822ef13dda5b5fea0edc178a3b65b2c76b0488f80e9950494ab7897d7f0dc3a39d588058e5366031ae9176925a7d58acdc6b30f537e06e03bda332d379e2be4354302686f878ea0e992cf4ae3808115a9497ebd483f3515174ee15cfc7e788dedc1f6245aff982c749e7b760f1ce7325e87ffd4e0372a3324973984b5af66b074020dc77ae5e61d85d56f07c8a996711c0112dc405474fcb526cf4b146c4ad29cc447004a79070006ac0be992818a2e1ed86feda0a727b7e902779ee264feb8272d928292d31290ac7d5bbcd7da00b027bff1bb9bc21ee525b09321b02014c69ea4c93ca74fa085fc3f23d7283d2c70535e2b0a69888eb3e21b522476dea723cb310ad61ac328d280787ebde6c34d9b68d2a1e996bd2e110d5d2689d5478952383ab6ccafe81d2f0b88fa2d299428952fd99eff225d74240369f4dc417d470b0d8703f5c915ab7c6e886278345ca38a82ce013a716d6dfd8e2cf321eaab951dec9e8999b91544c3dbbb6fae645d43fd39c4b98d1ccef6671ef615bf03b132a8208554d2fc27dae65fa75c0dd99748843d495a0e7515e665342c51b1f3e0b08287593e4a9f80483b9df82f67c3df3efd385237994975c31e03dd86b9d64e02c0eaca47d5b728601d24d5a115fcf9a31151297d792ffe7f2e9782e38ebffa8b45e344cfdbb0a6b11478c8169d00039e20b87ff2b65f05a5527c5d7bb22d0ebe7bd2a3388a6c6fcb326639d43b2982251439c788759d18c54b5bdda2f2582f3e5e586a5d103f48eb094a5d0b783d66e09c7c21ead27b2152f1f93da5c7cdea4df8234b6801f39f9a3db3bd6a4568ae6387ad3ef75082660c3e339bc882edbfbcebad61e1ded0275c0edb5fa596d835d81bce352e1a834e19e96f4443479f40878dd2b1ca47e072c20150266f4b56d94bf06ed384a840f30806c082c4939c058b7dd73fa1b99603b6dff80377353284f669dbf6067689c4955f7a8f451bd64c6d2cbf3e768288e1a237bc8f5395d6cd705148eaaf281ce16b84a46e5a66c553aa17135ee0f86f161bf4f3f69abc28466ba757062110203593763b38132b095ad62af50f804d2f6605bbfe88470e33b73cdd444280e9219417a434ddc8c690183a4c31dc5a1b58bfb971b8a79a7acc58ef661e4a15f8d25e2e00b9ed7ebb98423d7f31456e82222ba75f311d14de04fa6aa1464e55c18a82537c4915d1e1241fd23eb8b8150223bb488cb6a259af462b5b15be4f4b789c0e48696c01d97aee619800568501cdf2906d157269616cebc7d5b76761b0ec9554a6d57b5502a0b8add4597762d95dbdfc7f769f22faf8f04f800e4bd86a1316f3f1450cfb2561d0c7a2d2f8659fbf8bce88711aea2db9791a49a6e178bb93517f58b13dd23e57470965a0e69dbdab5fe7c7bb3c006c240e0de7e7607d6d660e557b402145a88eacd8d8e2f08540c0906861316e5a9fe70a38581e8d2c98c9c2f284198985422d4c367827a78c28481191a14c89e5f3c5b043398b75bf457a09c7de4104ac264a7557aec2baee15d69f936296d8c07a7ecf3672f5ff33fbcd87c77e23bcaccf31ecc3664d448ed8b23155b4c9a62d40fb6349340bf6313da22ae8f6946a59a4b1ce8489a3801b6f8ab1770782b6677a16e1cefe143231577cff5592665328313f4739bff8f2cf73b48c3f926a82e5aa7b5f2c3581887ec35bb3ba3aa31257a5e8b8ad2b3d703db74a4a72f2cc94a2920da7a8d361082670130d95b7f7b55e31ccf9f0a82c68abc0ac161380b8e7ad1d85209309c4746b360eae57fe984df0a3f839898bbf170226f369c5257353a87adb139332b4e8f70bca8535c7ebb0b37666236765174d03af11bb753a3098dd1b28eacc97c11256b435298d2655aad45cb9296a6a4cea66b7a48015ccd2479f685e90d0ff05c8ebfe461c2309addeebeb83d9956167f57f812b239d837cbc03bb02f92990ba8fd5680a464909f9977ee3e113ad9565d8505c8651d46abf3bf4d4611abdeaa7fda60441d8ef87c160252302692f3e3f5990b389a8a6b4c37367f64639b1daf64758910e36dfabdb7054c6ce8b215afe399d80e706fc46e1556c06fc1403c2e98cbba6434882ec6ece7e1d707f4fb929e609e462b37abb2a6126bb1d84cfb80f8e19986600bce8fc0dfa4dd63304ec81375db8f3fb2dde9dcb48f9a447c987d79781254de76b1a227e890a5ba2b6663b1a78b697991da6d2d5de6cef807d0e46800897009104367812d7346232506d7e5edff2042ce138526607085ac70141caba47dcb60a0b65fe17e02e052779c3ff9b19ac8ebe8d5478087ec2f5cc21b3ee848e49442da7b70cf20e20f73961513836a81d799bf79583ef9b44a4244d391b252dca564e30156f5b524f59b8b970a586138ca3d54b865081eaa3e248dc153d73556e4b5116ca617042a9e3099fff2f75100ac253eb995208b1503a17bf2d513f774fabc00d80b14afa1dd5709da742f4ec4667ca501592d638950f4f6d53eb6b4d86d3c845d10e429266025734c8aadf01ce149593176be1a8659cf2689674fffaa97cbe35c0e0e57121a25162f708055edb6fc0ea27bec50086a20486177e518a9bc43d51055c3107ab56e0389976e240b4ad1411cd1e15305c54f53c24e1e994dea06c1b8986431a0f31d452c068cce13b468b2f8ec99692cb31986a2eace696e431b47669153b7ee4f65d213900f233aff4b957e85fea1d371bc3d122639eeaed36f6b25d40583c446e1e8e9a1371dcd25a7c1b025d0ec3b0e02ab7cf4991745998d6dee9654c7d7e7d87aa441aacf47081e8d48386652b45930caa4a7ef4dd2a511b6de530d0ec9263d7ad2505a18bfda1703abcbca62f5b28836b3594f9092e2f47421175c7f94afe2e8dacbd8c2ed73f8a7d19547648e89fb4223b1003600ff4e4417e87c0a876e0ce4d56c01270d1b0690517165cfc6d35a6144c73c3bba213f2ad48f62ce280f5e1bdb00d8845fd4f3ee88b7682ec253026983827808aa6b56a0d1dcb0863069f69e1bd5c3fa298d9ce3aa944cf3cbe46fb6c2a67f9f23f22a195420d42a0fe7df80ea53925ad2e8d4f6b593ef3986e65636b67c90999343108efd00b272e7f696c314f813390ff0a283f04b35760871b7f5049546b5e92dc65e2092a4d2cc8d859eea75a533e0308163b56e1d41f633a9f4b98d8a8e6489e399fe1859496228f045de281271256b648b0e1c4cc1590b6b100c84a337be24be1959a181ef57913e20400cbb875bcf36add92a3606beb93da33bb2002ea6a284644ee8997203bf23fa351a0300e2253e08d93773920e28e9ffb9e8647522ca1bde9b662106ac1ddd35d6741500a136c7408302f3eb1e1c06345a91b5b1f29b5851ff6de18f8fe7c64ff4307295e9f4c487178ff737df008f7f056bd56e91f570f9f1b9eb5e0ef0fb9f2743fb6c561f01cd944170dd952f3041f8cf6b3b1616bde54c78a469eff5e9e0cd25a09be465852c60de54b837374a59113292602315b15a1b557cd66926b6e4fc91645a6951dfbf4abafcd186e6142789b9de1476fc78e8f408250b905c05bd84c8b1c48daf1f611efdb92cba1e65036c1717c04495d7895f149f11083af455b244a2705c65e56f3e298dbcfd593dba14d9240020e83d24432df20ded9633e2e5e5824837c52fcd9db43a4ecc3389c7a22568d5a6f3db1c5ce7463db94ba3bc4f1400235039cdc7aa66c817b93553918f2505a7e396aae958e081879b0005e1003253a224ea4229e646d16f188a2aea00f46772953838db6f949a7ea5ece465eb0692e3899785c26b5688b13269514066637eb58d9549d55cf71099edf34b0b41d154ca0f0a04459cb4a766bcf25e6d62462d4b073a065709106484212dd5652fd52cbceec0f85cef684948bbd9dd788a7b31874c936a34df1fe40cb96567fe7a1b14b1fc4bf22d7ce342acf2e792bc39156145089e3d1c62d16fa12251e27afc7f5026b0e718c8d5958aa883bf30f8eaf8f98c9e23c40601e3fc5a4a82f8272fb90d0430a24bf293616fe940978aec6f6f73e6d21a5f2de6f6fd9c76bc7967f0", 0x1000, 0x6}, {&(0x7f0000000140)="38a9a89f48245caf41f34bbf470e5327682c551fa8f755949d4aac6077194384138fe63f40d9a440940061fa44a94f90127fb9d42e3b855f0403f54998d4411113e326a9a68feb9e4d507cb4ada57620288c5d35cf0f9e28b57b631feb55d6cdd74fe32eb6f428a59cf7824666685b03b27e43364e8341539ed4db163fcbc11ee700474485b0acdad00443beb15eb9ea15dac75738b77804bc85e787a64d60ff7650fc793be9a65fcee6562ac7b9303ea6204d32a1dcc760e1dab045aa8ecb9efbb689a7d96caaf3ac8ee0743b6242341d526bf4cf39a32c8a4e5262dd7ee20ec1feb583405faa81e10e", 0xea, 0x8}, {&(0x7f0000000240)="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", 0xfb, 0xf5d7}], 0x1000010, &(0x7f0000000480)={[{@errors_continue='errors=continue'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@oldalloc='oldalloc'}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', r0}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x45}}]}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000003c0)=@raw=[@ldst={0x3, 0x3, 0x7, 0x5, 0x0, 0x0, 0x8}], &(0x7f0000000400)='GPL\x00', 0x538b, 0x0, 0x0, 0x41f00, 0x1}, 0x48) write$binfmt_aout(r1, &(0x7f0000001a80)={{0x108, 0x7a, 0x2, 0xf8, 0x1f, 0x7, 0x13a, 0x5}, "bdfb0dd9b49fde962c91dfb36917cf91d0b24b3783d68e6653e8fe8326668341cfccd5f7a5bf5b8189a3de0d97fc2dee1ed30b63bed2de47b16eb48f437cec574829122b1f465790072b0af320888400327c277070063aae39e469d55b11cb6b710993d8411ab3b491034b46446a880470febce07e50771436c0b3594f4e81aef8f47e2ad1919380f3eff0f1fec724fad4a38a55203524c170154c2d9b920d2e9dccfd07fba52101689ffc50f61f323b9b5d010152d3a67e60ec7092a632e759d3f5cc37308932c12924ffc4c8644f9f81cb585a68708c135d228072d2aa51c86d7ff2908961d49c6d5ee01fd98d54362d8314", [[], [], [], [], [], [], [], [], []]}, 0xa13) 03:35:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x3}}], [{@subj_user={'subj_user', 0x3d, '**'}}, {@smackfsdef={'smackfsdef', 0x3d, '\\,trustedvmnet1(ppp1,'}}, {@subj_user={'subj_user'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@appraise_type='appraise_type=imasig'}, {@fsname={'fsname'}}, {@hash='hash'}, {@subj_role={'subj_role', 0x3d, 'nouser_xattr'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x7a, 0x35, 0x61, 0x28cd810ba99c4fc2, 0x61, 0x61, 0x72], 0x2d, [0x39, 0x7b, 0x37, 0x65], 0x2d, [0x73, 0x77, 0x37, 0x34], 0x2d, [0x7b, 0x0, 0x34, 0x31], 0x2d, [0x36, 0x67, 0x0, 0x0, 0x77, 0x7d, 0x38, 0x3f]}}}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 3: pipe2$9p(&(0x7f0000000100), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x102, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) io_setup(0xff, &(0x7f0000000040)=0x0) io_getevents(r0, 0x84, 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000080)={0x0, 0x1c9c380}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x80, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x70e8}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0xfff}}, {@mode={'mode', 0x3d, 0x5}}], [{@smackfsdef={'smackfsdef', 0x3d, '9'}}, {@euid_gt={'euid>', r0}}, {@appraise='appraise'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_role={'subj_role', 0x3d, 'posix_acl_accessem1system\x9d\'GPLmime_typebdev*'}}, {@obj_user={'obj_user'}}, {@fsname={'fsname', 0x3d, 'em1'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}]}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 03:35:14 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x19b44) mkdir(&(0x7f0000000080)='./file0/../file0\x00', 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:device_t:s0\x00', 0x1e, 0x0) 03:35:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e2c00000000000000005adc9615"]) 03:35:14 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x410040, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000000)=ANY=[@ANYBLOB="6f6f757365725f78617474da4b8e95a31eb18efb284379cbbc9cc0d9dd34eedc53c6d8630503"]) [ 473.234431] SELinux: security_context_str_to_sid(user_u) failed for (dev bpf, type bpf) errno=-22 03:35:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x800800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) fchownat(r0, &(0x7f0000000300)='./file0\x00', r2, r3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xc8, r1, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20048000}, 0x4000000) r4 = gettid() perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x5, 0xfffffffffffffff8, 0x2, 0x24000, 0x0, 0x6, 0x10003, 0x4, 0x3f, 0x5, 0x200, 0x7665, 0x2, 0x9, 0x3, 0x6e95, 0x7, 0x9, 0x3, 0x9e08, 0x6, 0x5, 0x3ff, 0x7, 0xcf4e, 0x40, 0x1, 0xfffffffffffffffd, 0x1, 0x0, 0x8, 0x1, 0x0, 0x0, 0x107, 0x3, 0x0, 0x4800000000000000, 0x4, @perf_config_ext={0x7, 0x3ff}, 0x30024, 0x6, 0x2, 0x9, 0x10000, 0x4, 0x80000000}, r4, 0xc, 0xffffffffffffffff, 0x9) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x2) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000080)='hwsim0\x00'}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffff9c, 0x29, 0x2d, &(0x7f00000002c0)={0x5, {{0xa, 0x4e24, 0x7, @mcast1, 0x3ff}}}, 0x88) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000240)={0x81, 0x347, 0x1, 0x0, 0x0, [{r2, 0x0, 0x2}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f00000001c0)=0x54) 03:35:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100)="d8f3fb3bd9dd757ca00164d5ea33188ab394f92a0161b60ec95d406448ce3acb9a374b3e10c83d41eb2775a3a72aa924916bb0fd327083be474a756e131e63ef1a8d55e3e15aa26e7eb63013f474638356256af07ddbcb9ce9a9c536961b0355cdc489d3c156d86d5c42b1114bd9c54599cdb426298672f2664595dcd362c018c39804eabda1df26431dff74e03b9726a54cd70ce333a85a52903053b2db6dab4c5f3f4d3ec713d49a0a36f33e890284ea9516dd3ccfc3f6d72a5ecf7226d8e1b72efb872297866f9dc17523ac53d91248c1e2c27d", 0xd5, 0x48815, &(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000200)={{r1, r2/1000+10000}, 0x17, 0x303, 0xa}, 0x18) 03:35:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000080)={0xe120, 0x7, 0x28}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0xb, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0x6, 0x1, 0x0, 0xffffffffffffff9c}, @generic={0x80000001, 0x7, 0x5, 0x3ff, 0x800000000000000}, @map={0x18, 0xb, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x4, 0x7, 0x5, 0x1, 0x0, 0x0, 0x4}, @map={0x18, 0xb}]}, &(0x7f0000000540)='syzkaller\x00', 0x10000, 0xc1, &(0x7f0000000580)=""/193, 0x41f00, 0x1, [], 0x0, 0xf}, 0x48) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000700)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000800)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) fchown(r0, r1, r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000180)=[{&(0x7f0000000100)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x4}], 0x1, 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001000, 0x0) 03:35:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x80100, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x200, 0x0) pipe(&(0x7f0000000140)) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$VT_RESIZEX(r1, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='ip6tnl0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x2000000000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 03:35:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB='nousfr_xattr,\x00']) 03:35:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000040)={'security\x00', 0x17, "911acd767dd6f8c4241cbbd6efcc4814c486825e807a23"}, &(0x7f0000000140)=0x3b) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x4, 0x1}) 03:35:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) getpeername$unix(r0, &(0x7f0000000100), &(0x7f0000000080)=0x6e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f6ee7e94d7d4fa0e7c24229f339f93d69676e710b00000000000000"]) 03:35:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB='nouxattr,\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 03:35:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000080)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) r2 = getgid() setresgid(r0, r1, r2) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="008a722c00"]) 03:35:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = dup(0xffffffffffffffff) ioctl$VT_RESIZEX(r1, 0x560a, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200300, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f757365725f7861747a7aff01000003c874722c0034e807fb827ae5431d5be0ff00be83600900e83e6c57ac1a"]) shutdown(r0, 0x1) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f757365725f78345c58f22c00"]) 03:35:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) time(&(0x7f0000000040)) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) 03:35:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000080)=ANY=[@ANYBLOB="646162615f6572723d69476e6f6ebe903d13335512f072652d00"]) 03:35:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0xfffffffffffffbff) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) 03:35:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 03:35:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)=ANY=[@ANYBLOB="6e6f7573e56c5f78617474722c00"]) 03:35:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@timestamp], 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:35:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}]}) 03:35:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000140)=0x8) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)=':cpuset{(\x00') syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) ioctl$RTC_VL_CLR(r1, 0x7014) 03:35:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f657365725f78617474722c0066db628fe2987b20a6078d15b4d3a6472fbbe301603005ab51df3421588d7a2056b5f96978f348bc0e4a912778c6636b77f2e1eed67d83e24117889dbab84613bb9e4c9281bec534568c36c07144aacda3929230fa1568f50a50"]) r0 = socket$inet(0x2, 0x80b, 0x200) getpeername(r0, &(0x7f0000000100)=@rc, &(0x7f0000000180)=0x80) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000040)={[{@nouser_xattr='nouser_xattr'}], [{@smackfsroot={'smackfsroot'}}, {@subj_user={'subj_user', 0x3d, 'em1nodevtrustedppp1]user(security-)posix_acl_access'}}, {@dont_measure='dont_measure'}]}) 03:35:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x8000000000000406, 0xffffffffffffff9c) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x4, 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000004000)={[{@nouser_xattr='nouser_xattr'}]}) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'os2.', 'user+^3\x00'}) 03:35:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) vmsplice(r1, &(0x7f0000000900)=[{&(0x7f0000000340)="a1e637d7b581eab445a4899eb0a852da0046c2be92bf783597f6b1234cd872698211c05d9db807bfd48bff1e0ea75183ddbcf0f6f86ab0e2c52b832c5f620b1698439909aa9711e2a4d803b63c145817209713aed0a85301681a2708eefef119e59953f81c314a167f60078ce31ead45c16fc3983c1b9be38569a1492de16265682b501b1831d411820a141dfcccd261b4418d14ce31f82255f73dafa48ed3b4d208ba2b010ce1a33837e6d7b486d6c0f67f393a36174369d313e1f58c733aa2718354f4fda5e84a32e7be694e163fedd1e343127efb0b130b65728279a9b1", 0xdf}, {&(0x7f0000000680)="93b8ae5f1b8b5352016b2ab8ba3a2c6cc2a30c7d059d8eac887a247caf00c7dee50842a8657ad21134d9d2d2535cc4f81e387eebc736414edf3c6aa3c53e8399b5f2c2200f3881a098f4c4b40e079533e3111560a479e52069edfebfadd1a076b43131f5b2d4e2ceedb658681424055b359472015d3b484335186765554a2449c8d3c3c36256f65ff873187415641db91484c89357e821563aede37ac03a5c832be398f1572e1b5e1903aea32c1e84128a7e", 0xb2}, {&(0x7f0000000280)="9d4aa570f38802c9a66e5c70e3", 0xd}, {&(0x7f00000002c0)}, {&(0x7f0000000740)="a9b31c2069ca965a95c045c6afdd506be30c511428c54a49e902d4fb6bc9d60180c2c1ef80be91c59f13aede50faae29499d1cc0acee483a80d1a50cb55d0b0b86f62e823f7c62ea2325498a8d10b4f028c500792c2d9e0421f33ce86ef4e21fb53a9e1eab156e1e19f171b31bb6c3c34d920b71cab3d4fd5268718c1afb2a73ee0d08cf09a1064f7a63595f12172efe39e19c5986fca03b643ac7a33883dcd7ada4b24e3b491dc7263d8d3a6878cfdb9cd5063f48b60b3d33ea165db6a2dfd1e1e5c1ba405590e6075a923cf8f94ca782454c8add9776dd16b13dcf522b742075489534fd9df74c7a244d48d31d599e8b7966b9b9c5621d", 0xf8}, {&(0x7f0000000440)="a810b1764e5bac08e11aea3d810a408cdc656908a901", 0x16}, {&(0x7f0000000840)="3a4e64e952b1f190dd2e3e58f8c6", 0xe}, {&(0x7f0000000880)="e9350de2261d70dff033784baea32454e8e9e1e0b74482f0d305c2464569ee21612fd64f4f039d2e0b5448bb2a85023612851c1624322b2ec6489ac7dc4bd63a22add73f570a80524108c41442add8c01d99c212179759fe4e", 0x59}], 0x8, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r1, r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) accept4$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c, 0x800) getsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, &(0x7f0000000100)) vmsplice(r3, &(0x7f0000000a00)=[{&(0x7f0000000980)="63df70b8cd40c6306551d120614f022803cf68e5f2b53a8903b46ea7599b0cae2a76b2d6dd93f7f1bf0e4b8986f8c4ee46d9ca7ba1747a9ae59c47f95a9273cb5aee2c12e248384cde0e730843069d14ab7eab19001db6ec4754e3e27adebf2197b18e3673e458f4ab", 0x69}, {&(0x7f00000002c0)="5d2c3e330554cd03ee325cc8001d190bc673", 0x12}], 0x2, 0x5) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f00000000c0)) clone(0x40010000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0x11, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="20002cbd7000fddbdf25060000004400020008000300030000000800060003000000080002004e24000008000500080000000800050009000000080007000700000008000b000a000000080006001305590d080004000000000014000200080002004e2200000800030003000000"], 0x74}, 0x1, 0x0, 0x0, 0x8000}, 0x840) [ 474.666512] ================================================================== [ 474.674056] BUG: KASAN: use-after-free in __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 474.682125] Write of size 4064 at addr ffff8881976951a0 by task syz-executor2/1832 [ 474.689297] EXT4-fs error (device sda1): ext4_xattr_set_entry:1608: inode #16484: comm syz-executor0: corrupted xattr entries [ 474.689823] [ 474.689855] CPU: 1 PID: 1832 Comm: syz-executor2 Not tainted 4.14.91+ #3 [ 474.689859] Call Trace: [ 474.704563] EXT4-fs error (device sda1): ext4_xattr_set_entry:1608: inode #16485: comm syz-executor5: corrupted xattr entries [ 474.709836] dump_stack+0xb9/0x10e [ 474.709849] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 474.709858] print_address_description+0x60/0x226 [ 474.709870] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 474.709878] kasan_report.cold+0x88/0x2a5 [ 474.709894] ? memset+0x20/0x40 [ 474.751093] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 474.756800] ? ext4_mark_inode_dirty+0x460/0x7e0 [ 474.761553] ? ext4_expand_extra_isize+0x500/0x500 [ 474.766477] ? mark_held_locks+0xa6/0xf0 [ 474.770533] ? timespec_trunc+0xc9/0x140 [ 474.774591] ? put_itimerspec64+0x1c0/0x1c0 [ 474.778909] ? trace_hardirqs_on_caller+0x37b/0x540 [ 474.783925] ? current_kernel_time64+0xb6/0x100 [ 474.788607] ? ext4_unlink+0x9e2/0xed0 [ 474.792496] ? ext4_rmdir+0xae0/0xae0 [ 474.796309] ? vfs_unlink2+0x23c/0x470 [ 474.800208] ? do_unlinkat+0x327/0x5e0 [ 474.804095] ? do_rmdir+0x340/0x340 [ 474.807739] ? do_syscall_64+0x43/0x4b0 [ 474.811710] ? SyS_unlinkat+0x70/0x70 [ 474.815507] ? do_syscall_64+0x19b/0x4b0 [ 474.819583] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 474.824962] [ 474.826579] The buggy address belongs to the page: [ 474.831502] page:ffffea00065da540 count:2 mapcount:0 mapping:ffff8881da416b10 index:0x42c [ 474.839811] flags: 0x4000000000001074(referenced|dirty|lru|active|private) [ 474.846831] raw: 4000000000001074 ffff8881da416b10 000000000000042c 00000002ffffffff [ 474.854709] raw: ffffea00065d5ba0 ffffea00065b25e0 ffff8881d5753e70 ffff8881da81aa80 [ 474.862585] page dumped because: kasan: bad access detected [ 474.868284] page->mem_cgroup:ffff8881da81aa80 [ 474.872765] [ 474.874382] Memory state around the buggy address: [ 474.879303] ffff888197695f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 474.886654] ffff888197695f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 474.894004] >ffff888197696000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 474.901357] ^ [ 474.904713] ffff888197696080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 03:35:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1020020, &(0x7f0000000080)=ANY=[@ANYBLOB="64617461142e27cdcc506572723569676e6f72652c00"]) [ 474.912064] ffff888197696100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 474.919412] ================================================================== [ 474.926768] Disabling lock debugging due to kernel taint [ 474.943613] Kernel panic - not syncing: panic_on_warn set ... [ 474.943613] [ 474.950992] CPU: 1 PID: 1832 Comm: syz-executor2 Tainted: G B 4.14.91+ #3 [ 474.959035] Call Trace: [ 474.961619] dump_stack+0xb9/0x10e [ 474.965156] panic+0x1d9/0x3c2 [ 474.968348] ? add_taint.cold+0x16/0x16 [ 474.972322] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 474.978025] ? ___preempt_schedule+0x16/0x18 [ 474.982432] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 474.988133] kasan_end_report+0x43/0x49 [ 474.992097] kasan_report.cold+0xa4/0x2a5 [ 474.996272] ? memset+0x20/0x40 [ 474.999544] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 475.005246] ? ext4_mark_inode_dirty+0x460/0x7e0 [ 475.009998] ? ext4_expand_extra_isize+0x500/0x500 [ 475.014918] ? mark_held_locks+0xa6/0xf0 [ 475.018974] ? timespec_trunc+0xc9/0x140 [ 475.023027] ? put_itimerspec64+0x1c0/0x1c0 [ 475.027343] ? trace_hardirqs_on_caller+0x37b/0x540 [ 475.032351] ? current_kernel_time64+0xb6/0x100 [ 475.037036] ? ext4_unlink+0x9e2/0xed0 [ 475.040921] ? ext4_rmdir+0xae0/0xae0 [ 475.044726] ? vfs_unlink2+0x23c/0x470 [ 475.048611] ? do_unlinkat+0x327/0x5e0 [ 475.052490] ? do_rmdir+0x340/0x340 [ 475.056165] ? do_syscall_64+0x43/0x4b0 [ 475.060149] ? SyS_unlinkat+0x70/0x70 [ 475.063984] ? do_syscall_64+0x19b/0x4b0 [ 475.068042] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 475.073736] Kernel Offset: 0x3a200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 475.084640] Rebooting in 86400 seconds..