:50 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:50 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x0, 0x1, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000006e, 0x0) 15:24:50 executing program 0: syz_emit_ethernet(0x42, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0xb, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x18, 0x7, 0x3, 0x0, [{}, {}, {[@empty=0x4888]}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x28000) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) 15:24:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x7e, 0x7fffefa5) 15:24:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)="8f6f49bd426fc50dfecbd7fdef6647be16db03349787566885bb1c7931fe813a063a3ce3746e3cf0dde2314b1b5f725981102980", 0x34}], 0x1) r2 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000100)) read(r2, &(0x7f0000000140)=""/166, 0xa6) 15:24:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x45f) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400400, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000040)={0xbf, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'ovf\x00', 0x12, 0x1, 0x63}, 0x2c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000004680)={0x0, 0x0, 0xffffffda, {}, [], "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", "1f0b9e513a42ec679ebfd41b28324118d4c1628fe02a97c613f313571dd0efd63d679eb1024ddac20c2e38ea1340a51c479e354d14a4aeda959b8cda34c8edb7d627985d89c85dff22f8b6b1a33f2ea902fe64ea14071d78a2f2a59f5f43ff3dc5a5d0d1292fadca2c6112561485ce3e23a15484086bde5e6cba08c0a2b653d97d089e259b0e04eb6b2fa61bc51a834d22c0e904f7c43fdbf53f055d7d0b1f196915c23e0e5d1edc3c110ca21961d4b097db18849e1016536ca5f424baec5543ef5b0ce56aa63f5253383d7d7be6aa1b967f14b0081c7683120d19544f8d303e1d26c5e84eb6aefa23aa3333caccb04f32c514b4e7e6f73239226990827e11851730f32f3a9c852efb05dc52cccbf7829333c9041c122d22110206ef09ea31dfa8169a1f2909967a3d7de2542cd879eb93563adc118275aded4cdbe09b4d4b1286fa1778af4a4c850b45f3b7de86f8e677e51c13897a3880a1924cb8279952fd9e052d0f3ee13626c5f3fe52d30338e6b37a959331d6edf0f47d3e3353f9d776c2eabc8b84454639e28fc08002973d0f5187077a1a630410d245291331b152db41205e5fc5188c7bb53dd7f91a6ddc749616719de900e9e59681983f3e27214d79b74ec8364fd40b9946b0c12d7b8844b5a35e79580ddb84452f8fc1f7e327726ad7881198c639c0bc3e8300246e3cde72ea43227bb8430da2d7a7e5b468acb556833da07731205cf00e8eaa5a0acb1db03ca51f30ac7c5a616719b3a8057600be4c3b5b284e644a4bf2399a1d2668f30c7f0de655808ab3096bdafd9dcc6ebf76fa3a1febf311cf7d78812b649fe4ba0473cb65a34c5c380c78ecb0ddd8a817f21637575575e1d74075ad74ea68b226be01950d3ad5a84a19d84a1c23c3da764e512b97e00b99fa1e2c675273f9151e15f838d1303320dbd46e69f549f04f1337e9e490427863270888f7cc525f5a55daa60a7367e2912f6e5add373d1aaaa11a66e89bcc97ca1646a8d8acc40d6644efce3b563314ae41c6a20653788154064c53c8f9885cf847b3eb4a54dc7a304a3354db7fd6d7a22effc19b010c4488a5f33529527f9a957f1fae7ac046881943906f07dbb08e848c01e4324996af4ebb78bd2110c66ffed0939fe5949a52200c7fd3fc44789fd17657654688274d65851ad1685b9d037bad5d3c9fa4ca4e1ba0848bae2205e3264af2e60904a97524fceaf8a30502287b583ee8cab97bd45b3c4abc1b53698398f3d94665b75f1c485b3d5820be16d14fe5c8fb2d76f59cae6dcd892d3d1956b9860100000000000000182c70e71c7cb82c21c825487c41d7c7f954fd6e0b7bf804b954411e66a55cf95a07b648559e0956226dadb03b76015d1caff91a71ba88bf9385dc2ca59b84292eac5ac09c7a4e90d1872209ebb590a68d54cee35d8d6ccb8dddff7b062e56726a92b3a1986252586cd7bbb56ee8b81ebc65d21252697f2b01b7eeb9e767d692fadf373e2a859a1dd2b1a660c41ff3035ed637791da2f343ff2260dc78c2c58be408e5940bb25f8eb4db666bf7632bd7705ef3e314e0111d850421530d76037123c12b2653263f16588191630e7592d5389017d3b17e83ddbf579c73bff2d51a88861743a2cecde3e512e082de000000004a3f753fa0845851a2f9cb42635c256707a919312a2637ffc82671a285790f0fe392133378b5c4a50e7802212458c9dd30ab52e4ed52397a67c92c8718cc1bfaef14f11dfde8222f6c89d07415ec4fae4846da250bb5a7ebfbd84f25bbba9921667d8af3bd5622ff3b7d6bf93ac9c89072e4115bc0b4755485a952da6183311874051b832991c1b3490ff9cf198ad385a5009faa1d7fc6d4d963b3c64eacc56136356b52d9c661bfd9051ee11926405726d0bfd616eaa72f49773d57a80cf8dfc088bb6cade15f4f50dc72af7f091f0c9ab0737eaa6030cc00c567db26b994e12b9ddbb4d8b340fb8bca28125c300b925aa0dd43af4e167ca4ec37c5dfff55ed85cb90e3744525492c9b08d0434d2a2643a6dc79bb4ee295f047c3195e03e0b01629affc5774181d09cdd0e6c6816307b3e8943cafd1f3ac6fc7f4d77d61a386f98415d67ce02b80e01f2849cf740a731aae2bc26de3b11e5ce37f6d2283bad9db855f30de91fca2f8fe780f3056d2c6924e9907ace977eb2483f9acd101c21c8de0f08d54c56eca96a410f7375ade38cfbd5ab98c7fb32e60fa4b6fd077a7827fbf725a32dc134cb006084f4b77db72bcf6d2e5a06998e8e2e3f0d372bfb494260a2e4c43e177842ec47d6bad1b778b9361201dbf054d360b054b5b689ec684dfac02ddfed561e7bbb9adcfb1b9b4731869c8604ef586f2a1ec8e4806608fe1c9d4bd8037f34e38dd8064fa8b6be35dd21ad6424202fa00af97936bfc1bbd881927bbbd8ad9d4e7b644543a1cd027a2db3d7dd53b6ecd99af6cdb46789bbaf31f869a12bf8c904b49e286e7ad97ea2a9d3d27e3a360c53e6163fdf059234f54b390eecc47c63453172726e2c947ebc182f4b68a571591c4c869a1fd884066b659a68112bc708e856427a51e049bdff3c7e0c4dddf8e40d693c22b29c35254ce4dc0da58a2afaf20b8316e615c20bffe261de57d0fd9c80f24002bc309e59841ef46ea8f3cc369d3654ddd2a9d3b4f26793766ef01b835fd2e809fdeefdf34eb90aee44aaf80b8964604d565e63b236b857f571f5cc4aa3b4b6e7ffb7b771beaa883bca127b0b55ff7c0cea76e47b8b6b289aad36ade2297af1ad70d06834aa4e68e878423a1524add214612751c2858398da5651dbaa6d4ac1e1f7bf4b0b1533fb7f255887c6a5964d87f3877842e1594fdc94a61d509343780a866e602846ff52e209b28c8a9f1d96934413d844993fb900aaa1b2a5b259adb4184e6aaf802eb31f10efe6f339a929950677fec48199fede230e3b01dfe4d58ff227fa821d978dcb641be0b0e21f5bc0cfb9dcdc66f7d7883483b53cd0b04389e91e516f90175288ac30f0b7bc00e9c0f5c1adbac2a8f894e9678b4ae8e565efaae2c6057dc066ac4bbb56f82cca13e78d638cd1703a8eb6871ca63af19919174a6dc8dbda22bf7d989fc70115b4153bdcb7256ead7e17b695d0bbf989743e794406622dcdec0e0d6eeb5e263515b2c8685287d0fde0507ac468971d85e50297caeb13ba108053c6aa33b7ea2618e59eed135a824c9bd0818414b0e6e0c46f22086980665f8e9517d003daf0ee6b59c7a33d1ca60578acc71639e23c958896cd5305cfb0d63bab64d9483f0111269ef165d540e4cd44068062c7dcc09e3066de0c9033ae067a03900a2bd73fb67e1d340adb969d2be169fc059a1834a6f85f3ac651fed2279006b45ca0e6fa7e5332a1a68d8d0d77bf62cb2e1d9a0d0442aaf9a989d819205d0119b0a07073a13b6fc7cff490c531fbccb48a449f545168ecd673c288c9c64c483430b207984684afff2d0c6027c86fc1074e963c480355b6d17c6b00a98d91ecc0aa6207492fee52012317cb648561627cfd7a6ebdf92d2fb0b75645d699f8dea515bc742081e63268e62e9d4a726875c5cc768e5baedd00d546a495093cc4d79a940f1006e66cc14998ece51bc18819425e7df6047bd018da981b71c6e47e511509504f06da67acf7f4a4c845346f1601c6a4f29c4bd30896b0a0e06618c8b32bd8fa8e8256dbb86a6574d324f75646a836177c6a833e78a3926af3ed9c8ed363ae9224b7523d8b934eae969801e090a1560f46a9542c174af0112d1d3c2ace73ab1510d3a62de7a171a85e59b31f2b3427fbb2505876bb51efca76ae5cbfc730c06b058173ad39bc80509eefc19dd47cb7e5fee8488a0e990d8e6c004f1af86d483f5de858ed26bca32a25c3528636c62835acf02e95ddfce3f91d3924fc1dbe2844629b780d14ad143437c60128bf55b1bbf765b99b0d7cc6befa777d31d61e558387941fc418ed9c6c133287548b7d7b5008a98b14e615500b1ab2f7df85782daca43b2a3ea8712d2ffc6fa734e9158da06dd4fbed0f67d3086ed8c58825b0457e9f28b53171e5ba0b332d01f94a474089d17f46b60db0d3e5eb22a38c6e26bc11186ad5dcf62bd0bf10f9664945e99d90ceba3fe90aee991e5f7cc3bd5569f9950067cff31d7d2040f5fa5132bb314b87d5bf041d0be431b54664d3c6af255fff3b68ce75bab62d8667929fc6abccdae8afac89c2e8000e7f22c68fc852212daee06d3b7b2bb5169a8be3bfb1d6168ad23c523af3d6d0467b43561053afe776a8a94e2b8e5dade184be5f34f1b097f2c7a8b40464e3886f9d0e0e12596cf017c9443dea699a3a8936d6c2d73e4924a481cb8af9c69595589d15a0d4641525df72993887dd16192d1b6fa0146a4c82f28c5a9d5849ef5fd772f6966875ea0ed1f1c0efcb2e45e5967052e1414b4de236c3da4e05c616b88a5f147ff1d993ee465090c7ec180fa6adb8f1acbacccebca4a215843aeea79e4752760577b75e5f39eca7a921ece10f83615393dbe9cf1c1efc215c4ac889de1e10a71ec3146e942bda0a3c9abc87616914da3dbb1a6ee54cdc59bea747194d212163f421633a5a6eff9ff1da055626aea50734b71069a8306448449942c62bc643a7c81e8e35813b9ba5e28012a55878a4c4f6653b97c7d328f901c4e6e04d6858231b0efc3280f2f8592c613e1163d90e8ccf9bf6c624d606b19cb7e8f297b8f53725edcfab8153f27a1478108338cf8e5068270b3a4d6b8c72c7ce55da0a023a54949c221874d75527c2aa6cf6f3941f4907bf17dbabcac9577a8ac8ab0ca490e7d0131759a365be67ea022ea3a324ad819bc48d570f3e5efa2bdcc22d5fb1b86bf97c3034ec6948ed4fb2e36fd4be43c22d4a50dcdbffa7c193863154b417f24a291bf19a049abe14e68dbcbe33d9514da9181d5baf1e0d4950f2986d5b5744478dca29411af665372f9b9d62ea0c422aca3d675cc09b3db9dfeae4f3ff450e11daf20c8a533d30dc0837b6cfe66ccc3e08fac9cf7119114ab9ff9c06e70dbf09a8bd1460e7c71e91b7777fad1dc3cffab2d1bac90d6992a4d2ef493e1fd30bd50c97ee17e3c3c673ed17e39e093244d8f6d7c3e626639054a5185ef0c9b402d470cbd6f2b0e614daae562c03bb8ec08989965cca1b4c80192c278df55690a21d5b512c07e3650f0741d414f324437b63cf0e5c4c0e35313961b0a7c3fc303a4e660fd9a33681d78781f8f2db5a6b11588063c8c33778b3d64589a2433757b4da2aa3245fbecdb0978cc1cc26eb346ad38b7469e3c0d874fc1aac94654882edc13f82abfba20fbec53578f24f1b1458e0f24a88e5e5cd1be9721e332bba4c724792819bb696b492d6ebbccbe48760a891fdb4b118a94f6e8d16d0b184edf713eaf11d595deb5b234dd566770d6ffbd7fcc4c32c09bdb420cd38fe80ccce3f37c41c260c1527fd09947ee8457fecc4da308c2cf19648581c1b0d3fde0f645cea0cf7850d5511b21982e4c7cda7696e890949ac53aed5e9ef16af8536697c13b1db9875c8ddbd1395ac7a6a48e1de652d71a9422740edea16abbf2ad6bcbc198aa1418eb9eda000af55a17243e0837a909275613a171eb2f49f45e7c2fced84bfb5f4b28c3daa8ca08680b27095e74690cc99427ec01a88253b12456cd8cb8c2c4af6a2ce0d597f406efe49503799e6148985cce9ab39f0f9da91f79651f0c380526d228f754f2eaa5bac557e17e9fe0eaf81e36e77b63e76265d1d018ffc79aac1bdff5ec5b35764551ac38ef56e3f34ccf30"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:24:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, 0xfffffffffffffffe, 0x11) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000006f, 0x0) 15:24:51 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x5000000, 0x0, 0x0, 0x100020, 0x0) 15:24:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x82, 0x7fffefa5) 15:24:51 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb729, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000800)='./file1/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() syncfs(r0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) r2 = syz_open_dev$dmmidi(&(0x7f0000000840)='/dev/dmmidi#\x00', 0x100000000, 0x40000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000880)=ANY=[@ANYBLOB="6500000020c9a28e37f724d12ef47d760f2ffaf5d15dc66927a6d28ed2d65d17c097de8b5f9883a068835ca58cfca2067b481be30ebb08714316d1d2346718c7cea02f6e8d8e5c8264954ca4a9c223cb6fe084d66a31309784f0be0377ee0000000000000000000000"], 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000940)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x3, 0x9, 0x2, 0x0, 0x1000, 0x9, 0x6, 0x100, 0x401, 0x0, 0x0, 0x1, 0x40, 0x1, 0x5]}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc8, &(0x7f0000001d80)=[{&(0x7f00000002c0)="f31acb1cf911e955e64822fa25934ba8ae4c3f66b0b851ad9956d7423ac8da3041ea75859d36d9e0a16bea13f898f02b28eedc814eeaa9abfbc098", 0x0, 0x9bc0}, {&(0x7f0000000c80)="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", 0x0, 0x9}, {&(0x7f0000000a40)="a49ba8087fe28c74369ccaba31d0ae3e3f834f122d192f334f576554900e4dfd2583ffff7eb7d707d74a8706abdbfd54d357ce29ec9c325e6610756b7a944fcf8e3c52ee20b3275b05d5f89701b2a382587a193d95c4aada1256b7bf656979758cce7ab1a0b90320dd51e7ce5fd2b0b808e9ad1d20a0ba77286cb51dd1eb2d2ee20a2c088abe3a7d13cd5f11fd6148ee6b1bf3207b1482e96cad65d0e0cfe574e474219d8f71a1eb74dc0333b6e220bd125a3106044d9a743e", 0x0, 0x100000001}, {&(0x7f0000000b00)="ecb331df8d4bbd29f7474c1f27b6c5a8202409bba27f5ef1deb48943f30eb61dc190823522b9e2726d360ac6ad1b920fe96b97e86a51f98efe599f2765bdeacda174f1e339bed5049ef388221eef79f37832a988917abd5a706044e09aeeb4c4106c3f8d7c27cae0b1fd67a666e128fb60050af065de162a72098762a8518f88aeedbdd7f388fea44a94391fd35a1779867023ae57406b4a4a045f9adc", 0x0, 0x1}, {&(0x7f0000001e00)="bafa26f5ecaeab210a9a71d7f64f0ead281f32eeee541865752f6e030c1c3a803c2a966f7eaf29750d037a262b822ab4c9c01518624c47e3795f1251faa7d69fb7747af13d407d609dde4ebc9f0ae68b04a61a8cb9581a0823cbcac0c7ff602e9abd0dc43378d83bd9b58cb5011087b78439dc5c0ac60c0880ce6b603074afc84fcca06ab0e88f47998f2231afba4904a8e4685059e8d920c63079e70377dc2865c069a9b2ccb51bced406264551f2aad2b85a58fb5a712771277efea250fd0afe3d1dd3cdf4de1396759f9d414dcaf4fccb875201df77f302264d4fffd54e6c2e4900000000000000", 0x0, 0x9}], 0x0, &(0x7f0000000880)=ANY=[]) io_setup(0x2, &(0x7f0000000580)=0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x101000, 0x0) io_cancel(r3, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x6, 0x1000, r0, &(0x7f00000005c0)="ac32aa93d7196ae22b47ee49d1a9f0a43078332e08ef324b190972532b1a05f305dd149d00c821fede27e33a8c275fc274e1bdd6a5690dfef10e53400e91b74ee0feb112ce014ad221a671d2200a36fac94147b6cabde66dd1d68d22f6e846b8bcc8db217b444a57c4f122615e71a04cdeeff99161dae852a93203daadf4c11a10bf569afd2f5d7b7e75a5fe74ae", 0x8e}, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e"]) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000100)=0xffffffffffffffc0, &(0x7f00000001c0)=0x4) r4 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) write$UHID_DESTROY(r4, &(0x7f0000000340), 0x4) chdir(&(0x7f0000000280)='./file0\x00') syz_emit_ethernet(0x2a, &(0x7f0000000140)={@random="d64f2587f32c", @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @rand_addr=0xf1e, @random="fe8b1d35cfb9", @multicast2}}}}, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x0, 0x5, 0x81}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000380), &(0x7f0000000540)=0xfffffffffffffebe) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) fallocate(0xffffffffffffffff, 0x40, 0x44, 0x81000f3) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f0000475000/0x4000)=nil, 0x4000, 0x4, 0x10, r5, 0x0) r6 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4000007ffffe, 0x4002012, r6, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000400)=""/223) 15:24:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @broadcast, 'team_slave_1\x00'}}, 0x1e) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x3) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x634, 0x101401) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x10, 0xb00) 15:24:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000070, 0x0) 15:24:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x83, 0x7fffefa5) 15:24:51 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6000000, 0x0, 0x0, 0x100020, 0x0) 15:24:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000071, 0x0) 15:24:51 executing program 4: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x15}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)={r1, 0x5, 0x2, [0xadb, 0x1ff]}, 0xc) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x4, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x2d, "5202ce05fd17adaa5fc7ce1b5f9a1bd3b2149a223a0af8acc66e45471bf222e17b8b23a3773d818654d8bfb9b0"}, &(0x7f00000001c0)=0x35) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r3, 0x6}, 0x8) [ 622.585123] overlayfs: failed to resolve './file1': -2 15:24:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x84, 0x7fffefa5) 15:24:51 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x100020, 0x0) [ 622.679512] audit: type=1804 audit(1548257091.633:46): pid=17976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir632263008/syzkaller.VfwR25/528/file0/bus" dev="sda1" ino=16753 res=1 15:24:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000072, 0x0) [ 622.789669] audit: type=1804 audit(1548257091.683:47): pid=17976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir632263008/syzkaller.VfwR25/528/file0/bus" dev="sda1" ino=16753 res=1 15:24:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x85, 0x7fffefa5) 15:24:51 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb729, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000800)='./file1/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() syncfs(r0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) r2 = syz_open_dev$dmmidi(&(0x7f0000000840)='/dev/dmmidi#\x00', 0x100000000, 0x40000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000880)=ANY=[@ANYBLOB="6500000020c9a28e37f724d12ef47d760f2ffaf5d15dc66927a6d28ed2d65d17c097de8b5f9883a068835ca58cfca2067b481be30ebb08714316d1d2346718c7cea02f6e8d8e5c8264954ca4a9c223cb6fe084d66a31309784f0be0377ee0000000000000000000000"], 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000940)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x3, 0x9, 0x2, 0x0, 0x1000, 0x9, 0x6, 0x100, 0x401, 0x0, 0x0, 0x1, 0x40, 0x1, 0x5]}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc8, &(0x7f0000001d80)=[{&(0x7f00000002c0)="f31acb1cf911e955e64822fa25934ba8ae4c3f66b0b851ad9956d7423ac8da3041ea75859d36d9e0a16bea13f898f02b28eedc814eeaa9abfbc098", 0x0, 0x9bc0}, {&(0x7f0000000c80)="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", 0x0, 0x9}, {&(0x7f0000000a40)="a49ba8087fe28c74369ccaba31d0ae3e3f834f122d192f334f576554900e4dfd2583ffff7eb7d707d74a8706abdbfd54d357ce29ec9c325e6610756b7a944fcf8e3c52ee20b3275b05d5f89701b2a382587a193d95c4aada1256b7bf656979758cce7ab1a0b90320dd51e7ce5fd2b0b808e9ad1d20a0ba77286cb51dd1eb2d2ee20a2c088abe3a7d13cd5f11fd6148ee6b1bf3207b1482e96cad65d0e0cfe574e474219d8f71a1eb74dc0333b6e220bd125a3106044d9a743e", 0x0, 0x100000001}, {&(0x7f0000000b00)="ecb331df8d4bbd29f7474c1f27b6c5a8202409bba27f5ef1deb48943f30eb61dc190823522b9e2726d360ac6ad1b920fe96b97e86a51f98efe599f2765bdeacda174f1e339bed5049ef388221eef79f37832a988917abd5a706044e09aeeb4c4106c3f8d7c27cae0b1fd67a666e128fb60050af065de162a72098762a8518f88aeedbdd7f388fea44a94391fd35a1779867023ae57406b4a4a045f9adc", 0x0, 0x1}, {&(0x7f0000001e00)="bafa26f5ecaeab210a9a71d7f64f0ead281f32eeee541865752f6e030c1c3a803c2a966f7eaf29750d037a262b822ab4c9c01518624c47e3795f1251faa7d69fb7747af13d407d609dde4ebc9f0ae68b04a61a8cb9581a0823cbcac0c7ff602e9abd0dc43378d83bd9b58cb5011087b78439dc5c0ac60c0880ce6b603074afc84fcca06ab0e88f47998f2231afba4904a8e4685059e8d920c63079e70377dc2865c069a9b2ccb51bced406264551f2aad2b85a58fb5a712771277efea250fd0afe3d1dd3cdf4de1396759f9d414dcaf4fccb875201df77f302264d4fffd54e6c2e4900000000000000", 0x0, 0x9}], 0x0, &(0x7f0000000880)=ANY=[]) io_setup(0x2, &(0x7f0000000580)=0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x101000, 0x0) io_cancel(r3, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x6, 0x1000, r0, &(0x7f00000005c0)="ac32aa93d7196ae22b47ee49d1a9f0a43078332e08ef324b190972532b1a05f305dd149d00c821fede27e33a8c275fc274e1bdd6a5690dfef10e53400e91b74ee0feb112ce014ad221a671d2200a36fac94147b6cabde66dd1d68d22f6e846b8bcc8db217b444a57c4f122615e71a04cdeeff99161dae852a93203daadf4c11a10bf569afd2f5d7b7e75a5fe74ae", 0x8e}, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e"]) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000100)=0xffffffffffffffc0, &(0x7f00000001c0)=0x4) r4 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) write$UHID_DESTROY(r4, &(0x7f0000000340), 0x4) chdir(&(0x7f0000000280)='./file0\x00') syz_emit_ethernet(0x2a, &(0x7f0000000140)={@random="d64f2587f32c", @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @rand_addr=0xf1e, @random="fe8b1d35cfb9", @multicast2}}}}, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x0, 0x5, 0x81}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000380), &(0x7f0000000540)=0xfffffffffffffebe) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) fallocate(0xffffffffffffffff, 0x40, 0x44, 0x81000f3) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f0000475000/0x4000)=nil, 0x4000, 0x4, 0x10, r5, 0x0) r6 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4000007ffffe, 0x4002012, r6, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000400)=""/223) 15:24:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000073, 0x0) 15:24:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x86, 0x7fffefa5) 15:24:52 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = geteuid() syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="3386186d768cf97ad52f9e777c46f0b0324c02690cec671cb1026c1ad55f2a320a3b8a6f5a07b429554ebeee364f929a0b79d9f2cf11b8198dddb8b638", 0x3d, 0xff}, {&(0x7f00000001c0)="f17bbc46da70e544e80e6402e1e9cedd3cc7bd9853d443d8b7fd4727ae614c397325ee05e8de5f819edefced79cb1ebbafae5af35958524e0142be3857e8fd0719efd086cc794c23ba01d89f8cd520f65adc43c8c7180e", 0x57, 0x6}, {&(0x7f0000000280)="c34e0d1e8509dd3d677a850170c7fe8a4315f619338ece23303606af6d486a26f29c01eb82cffb0f86160c8b69dd81c32f9132d4333f4a088a720061aee24f1a1b0d3844c33f27a915151d78e82002dca2785c686cb811bcd02b3678d99d326aaa460235bc2e1fcd7fc8c2560cb6950ff4a19c3fceee3861dfaf8e98811b73eee4e8bdae58b578e246d1d1b0701ef015f1d7ffd7f6f88689c05198d55b104eefd3ab676c0937aba59ea1d395fdde22f784cf9fd8f7f4608dccf236072446690f9d35b6522e979958f3aa8e014bbf9a233ade495aef30cab796b09601a51e18", 0xdf, 0x7fffffff}], 0x40000, &(0x7f0000000400)={[{@data_ordered='data=ordered'}, {@nombcache='nombcache'}, {@grpjquota='grpjquota='}], [{@euid_gt={'euid>', r0}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, '\x00'}}, {@hash='hash'}]}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:52 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x100020, 0x0) 15:24:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x87, 0x7fffefa5) 15:24:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000074, 0x0) 15:24:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x88, 0x7fffefa5) [ 623.288806] overlayfs: failed to resolve './file1': -2 15:24:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000075, 0x0) 15:24:52 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x100020, 0x0) [ 623.378930] audit: type=1804 audit(1548257092.333:48): pid=18026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir632263008/syzkaller.VfwR25/529/file0/bus" dev="sda1" ino=16705 res=1 15:24:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x89, 0x7fffefa5) [ 623.449398] audit: type=1804 audit(1548257092.333:49): pid=18026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir632263008/syzkaller.VfwR25/529/file0/bus" dev="sda1" ino=16705 res=1 15:24:52 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:52 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x1a', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:52 executing program 4: mkdir(&(0x7f0000000040)='./file0/../file0\x00', 0x2) open(&(0x7f0000000200)='./file0/file0\x00', 0x480480, 0x20) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x6, 0x20000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000140)=0x7f, 0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2) syz_mount_image$ext4(&(0x7f0000000100)='\xf4\xb4K\x1e\x9a', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xfffffe98, 0x0, 0x10001e, 0x0) ioperm(0x15, 0x1, 0x4) 15:24:52 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1a0f0000, 0x0, 0x0, 0x100020, 0x0) 15:24:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000076, 0x0) 15:24:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x8a, 0x7fffefa5) 15:24:52 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r1) bind$bt_rfcomm(r2, &(0x7f00000001c0)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000000)={0xfffffffffffffed3, 0x2a, 0x0, {0x0, 0x0, 0xfffffffffffffcf5, 0x0, 'wlan0!*'}}, 0x30) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 623.674959] EXT4-fs: 46 callbacks suppressed [ 623.674970] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000077, 0x0) 15:24:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x8b, 0x7fffefa5) 15:24:52 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000078, 0x0) [ 623.778609] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 623.799347] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:52 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x0f', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:52 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1f000000, 0x0, 0x0, 0x100020, 0x0) 15:24:52 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000079, 0x0) 15:24:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x8c, 0x7fffefa5) 15:24:53 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000001c0)=0x2, 0x4) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x20040, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000280)={0x9, 0x0, 0x3, 0x5, 0x4, 0x10000}) 15:24:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000002000)) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x3fc}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x200) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f00000000c0)) 15:24:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x8d, 0x7fffefa5) [ 624.113591] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 624.145965] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000007a, 0x0) [ 624.158698] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:53 executing program 0: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="58465342a2579adfe6db4fea0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000010000000008000000000000000810000000000000082000000c98c8f5a000000000100000000000006c0b4a4020001000010000000000000000000000a000c090804", 0x7c}], 0x0, 0x0) 15:24:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x8e, 0x7fffefa5) 15:24:53 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x20000000, 0x0, 0x0, 0x100020, 0x0) 15:24:53 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x800) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f00000001c0)=0x8) 15:24:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000007b, 0x0) 15:24:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x8f, 0x7fffefa5) 15:24:53 executing program 0: getrlimit(0x8, &(0x7f00000000c0)) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) [ 624.406202] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 624.441430] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:53 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x10000) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000080)={0x9, 0x103, 0x2, {0x3, 0xffffffffffffff90, 0x2, 0x31}}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 624.502926] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x5e) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000180)="9bea77e53e5f") ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0xffffffffeffffffd}) userfaultfd(0x80000) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$bt_hci(r6, 0x84, 0x0, &(0x7f0000000080)=""/127, &(0x7f0000000000)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x4, 0x32, 0xffffffffffffffff, 0x0) close(r5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0xfffffffffffffff8) r7 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x0, 0x0) dup2(r0, r7) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000000)={0x0, 0x100000, 0x2000, 0x9, 0x637, 0x7, 0x80000000, 0x80000000, 0x100000001, 0x635}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x103201, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:24:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000007c, 0x0) 15:24:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x90, 0x7fffefa5) 15:24:53 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2d000000, 0x0, 0x0, 0x100020, 0x0) [ 624.624742] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000007d, 0x0) 15:24:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x91, 0x7fffefa5) 15:24:53 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x2) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3ff, 0x0) read$FUSE(r0, &(0x7f0000000280), 0x1000) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001280)=@security={'security\x00', 0xe, 0x4, 0x450, 0x218, 0x0, 0xf0, 0x218, 0xf0, 0x380, 0x380, 0x380, 0x380, 0x380, 0x4, &(0x7f0000000080), {[{{@ipv6={@local, @empty, [0x0, 0xff000000, 0xffffff00, 0xff000000], [0x0, 0x0, 0xff000000, 0xff0000ff], 'sit0\x00', 'teql0\x00', {0xff}, {}, 0x2, 0x3, 0x1, 0xe}, 0x0, 0xc8, 0xf0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x14, 0x32af, 0x6}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1c}, @mcast1, [0xff000000, 0xff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xffffffff, 0xff], 'bridge_slave_1\x00', 'teql0\x00', {0xff}, {0xff}, 0x5e, 0xfff, 0x5, 0x52}, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0xf53, 0xffffffff}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x1f, 0x6, 0x5c}, {0x10000, 0x2, 0x8}, {0x1, 0x8}, 0x2, 0x6}}}, {{@uncond, 0x0, 0x140, 0x168, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x0, 0x0, 0x4}}, @common=@inet=@multiport={0x50, 'multiport\x00', 0x1, {0x1, 0x8, [0x4e20, 0x4e20, 0x4e22, 0x4e24, 0x4e24, 0x4e23, 0x4e21, 0x4e22, 0x4e22, 0x4e24, 0x4e20, 0x4e21, 0x4e24, 0x4e22, 0x4e21], [0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x1}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x6, 0x2, 0x5}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b0) chmod(&(0x7f00000000c0)='./file0/../file0\x00', 0x6) 15:24:53 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:53 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3f000000, 0x0, 0x0, 0x100020, 0x0) 15:24:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x92, 0x7fffefa5) 15:24:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000007e, 0x0) 15:24:53 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x93, 0x7fffefa5) 15:24:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:54 executing program 4: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) r1 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000013c0)={0x0, 0x0}, &(0x7f0000001400)=0xc) r3 = geteuid() syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./file0/../file0/file0\x00', 0x1, 0x2, &(0x7f0000001380)=[{&(0x7f0000000280)="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", 0x1000, 0x13}, {&(0x7f0000001280)="6a77efed107dd8be5411ecfca332efc985a7a820ac8b038892a6f0526f295519cb20bcd3f059cf44c67e24fdedcb571da1c14388a7a9e899690e6f9bbede4c55f5f9b74f4d7d0a97c08c03d2ffb3271399793343332a60ba7a7a956756f2cd5083fc42bbfd69e3bba9379f05499cd2d51067123eceb73ede2ab80e99b27f22baa2a223b5eb4c475669fef764cdc70d0608d38e7fefb4f2357d3fd36d39796211aed268f9cc6a790b1af01b51f5e2cdf0abb319274e6716e4bea0e5174650af882d47fad5bfaed6fcc8", 0xc9, 0x4}], 0x8000, &(0x7f0000001440)={[{@nodelalloc='nodelalloc'}, {@noacl='noacl'}, {@bh='bh'}], [{@fowner_gt={'fowner>', r1}}, {@uid_gt={'uid>', r2}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset@['}}, {@uid_lt={'uid<', r3}}, {@dont_appraise='dont_appraise'}, {@smackfsroot={'smackfsroot'}}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfffffffffffffeb8, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffffffffffff3, 0x0, 0x100020, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x101001) write$P9_RREADDIR(r4, &(0x7f0000000080)={0x80, 0x29, 0x1, {0x6, [{{0x20, 0x3, 0x6}, 0x0, 0xfffffffffffffffb, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x0, 0x800, 0x10, './file0/../file0'}, {{0x14, 0x4, 0x8}, 0x101, 0x0, 0x16, './file0/../file0/file0'}]}}, 0x80) 15:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000082, 0x0) 15:24:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:54 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x100020, 0x0) 15:24:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x94, 0x7fffefa5) 15:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000083, 0x0) 15:24:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x6, 0x20000000000000, 0x6}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x3, 0x30}, 0xc) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000084, 0x0) 15:24:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x95, 0x7fffefa5) 15:24:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:54 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x48000000, 0x0, 0x0, 0x100020, 0x0) 15:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000085, 0x0) 15:24:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000000c0)=0x80000000) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) chdir(&(0x7f0000000040)='./file0/file0\x00') r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) write$binfmt_script(r1, &(0x7f0000000280)={'#! ', './file0/../file0', [{0x20, '/'}], 0xa, "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"}, 0x1016) 15:24:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x96, 0x7fffefa5) 15:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000086, 0x0) 15:24:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:54 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4c000000, 0x0, 0x0, 0x100020, 0x0) 15:24:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000087, 0x0) 15:24:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x97, 0x7fffefa5) 15:24:54 executing program 0: r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) r3 = socket$kcm(0x29, 0x400000000005, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x894c, &(0x7f0000000280)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x3f) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) write$cgroup_int(r5, 0x0, 0x29f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f00000007c0)='(\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x7, 0x2ee, 0x0, 0x9, 0x0, 0x2ffb, 0x4000, 0x8, 0x4, 0xff, 0x7, 0x10001, 0x6, 0x1000, 0x7, 0x53fc58ac, 0x6, 0x9, 0x5, 0x1000, 0x20000000, 0xc27a, 0xfff, 0x128, 0x1, 0x80, 0x3, 0x3e9, 0x100000001, 0x3ff, 0x5, 0x6, 0x0, 0x9, 0x74, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000640), 0xb}, 0x1100, 0x99, 0xdc59, 0x7, 0xff, 0x9, 0x100000001}, r6, 0x1, r5, 0x8) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000340)=r5, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0xc0189436, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu//.z1\xa0', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000980)='./cg\x88Hup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400)=0x5, 0x4) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000840)) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000700)=""/183) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x8000000000, 0x200, 0x0, 0x3, 0x0, 0x80000000, 0x8040, 0xf, 0x0, 0x1, 0x80000000, 0x9, 0x4, 0x80000001, 0xfffffffeffffffff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x2, 0x0, 0x0, 0x80000001, 0x6, 0x7, 0x0, 0x0, 0xffffffffffff968e, 0x0, 0x3f, 0x1, 0x8000, 0x0, 0x1d2, 0x0, 0x8, 0x0, @perf_config_ext={0x7}, 0x50, 0x0, 0x5, 0x2, 0x100, 0x0, 0xffffffffffffff00}, 0x0, 0x6, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x1, 0x8000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}}, r6, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x80000, 0x800ffff, &(0x7f00000009c0)) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000540)="43a96ad2238e87d8c97fec6a239ef9939b114511d4198d4ae698115638117ebaa140062028b9a7efeac6c74262ebb7dffe8f6f0cff94e0b1c5c73446f93a28ba1b0aa5e49245e0a1232da4806a70433d790490dc0726499631a6ef24d8b769a553de5bee293d6c17aab2ca721f931fa7fef7d5b2d181d6d54aae9805fcb8c628a4a9c059390d98f5dc7ae6b1a9d04fb6b44d2dbf545731d7bda86cd2978fae19522bac808e8f3ef6d447887429cc2792a0a03bddd55d50201b825ad4359804027f8bfefce45fda3b4a023f3ae317fdb995e565e16d7485f75a04d8f73a05", 0xde}], 0x1, 0x0, 0x0, 0x840}, 0x20040010) r7 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r7, 0x6, 0xe, &(0x7f0000000180), 0x1b3) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40286608, 0x0) 15:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000088, 0x0) 15:24:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6d, 0x0, 0x200000000000040, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) 15:24:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x98, 0x7fffefa5) 15:24:54 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x60000000, 0x0, 0x0, 0x100020, 0x0) 15:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000089, 0x0) 15:24:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:55 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4c000000, 0x0, 0x0, 0x100020, 0x0) 15:24:55 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) r2 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8, {0x4ef, 0x1000, 0x0, {0x0, 0x0, 0xc452a51, 0x0, 0x5, 0x2, 0x67, 0x81, 0x7, 0xfffffffffffffffc, 0x2, r1, r2, 0x100, 0x1}}}, 0x78) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f00000003c0)={0x13, &(0x7f0000000380)=""/19}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4000000000020000, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000080)={0x0, 0x9d, 0x80, 0xfffffffffffffffc, 0xe500000000}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000400)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e21, @broadcast}, 0xc0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x2}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r3}, 0xc) 15:24:55 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x68000000, 0x0, 0x0, 0x100020, 0x0) 15:24:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x99, 0x7fffefa5) 15:24:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000008a, 0x0) 15:24:55 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4c000000, 0x0, 0x0, 0x100020, 0x0) 15:24:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x9a, 0x7fffefa5) 15:24:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000008b, 0x0) 15:24:55 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4c000000, 0x0, 0x0, 0x100020, 0x0) 15:24:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:55 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6c000000, 0x0, 0x0, 0x100020, 0x0) 15:24:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(generic-gcm-aesni)\x00'}, 0x58) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8, 0x80000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8010001}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r3, 0x600, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6f, 0x1, 0x100000001, 0x20}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x200008c0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x29) wait4(0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7b9, 0x400080) ioctl$VIDIOC_S_OUTPUT(r4, 0xc004562f, &(0x7f00000000c0)=0x2) 15:24:55 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000080)=@rc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/150, 0x96}, {&(0x7f0000000440)=""/253, 0xfd}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x4, &(0x7f0000001540)=""/212, 0xd4}, 0x1) mkdir(&(0x7f0000000180)='./file0\x00', 0x7) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) creat(&(0x7f0000000040)='./file0/../file0\x00', 0x108) 15:24:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000008c, 0x0) 15:24:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x9b, 0x7fffefa5) 15:24:55 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x74000000, 0x0, 0x0, 0x100020, 0x0) 15:24:55 executing program 0: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite6\x00 \xe7\x98\xa6\xa3\xe3\x1e\xc7P\a\xd70\xed\x89;\x12\xb1\xeeg\xbe\xec\x02A\xd4\x97o\xbd\xdd\x9f\xea\x14 )\xa0\x05E\f^\xc8\xcf\xef\x93\xf9\xb1n\xe1\xbb\xe4\xb5\xf3\x05\x06en\x1ff\xef\xa6G!)3QRt<0\x8c\v\xdd)Y\x80k\x94\r\xdenjAG:b\xfe\xbe\xc7\xec\xf7\xf1\xeb\xd8\xf8\xd5F\x00\x00\x00\x00\x00\x00\xff\xff\xff\x1c3\xf8\xafP\x88\x13\xfc\x1f\xe4[)S\xa9\x92,j,<-2\xe97\xae\xd6!\x80\xeb\x87\xf8b@\xdd\x03Le\xd9J\xc7\xd0\xc0\xc9\xc31\x02\x00\x00\x00\x00\x00\x00\x00\xcf\xcc\xe6{\xd6+\xadI\xa3a\xdd\xc2y\xaet\xcb\x9dj\xd8U\xd1\xac\xda\xba\'B\xeb9V\xfcx\x92\x920\xa9\xec\xc6JjI\xe0\xe1*\x17\xeb\xdb\x97\xab\xa5\x1c\xde\rN\xd1a\xaa|ST0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) accept(r2, &(0x7f0000000680)=@tipc=@name, &(0x7f0000000700)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000840)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800000, &(0x7f0000000580)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@mmap='mmap'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@access_client='access=client'}, {@version_u='version=9p2000.u'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r0}}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@euid_gt={'euid>', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ext4\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, 'ext4\x00'}}]}}) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='ip6gretap0\x00', 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000093, 0x0) 15:24:56 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:56 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xc0000000, 0x0, 0x0, 0x100020, 0x0) 15:24:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa2, 0x7fffefa5) 15:24:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000094, 0x0) 15:24:56 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:56 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:56 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:56 executing program 4: mkdir(&(0x7f0000000080)='./file0/../file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfe1d, 0xfffffffffffffe2b, 0x0, 0x40, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x1000020, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x100}}, {@mode={'mode', 0x3d, 0xbb}}, {@mode={'mode', 0x3d, 0x6}}], [{@obj_role={'obj_role', 0x3d, '(}\xcc('}}, {@appraise='appraise'}]}) 15:24:56 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf5ffffff, 0x0, 0x0, 0x100020, 0x0) 15:24:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa3, 0x7fffefa5) 15:24:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000095, 0x0) 15:24:56 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001005, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xf63d, 0xc000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, [0x5, 0x5, 0x2, 0x8, 0xffffffffffffffff, 0x3, 0xf1, 0x5, 0x5, 0x1, 0x6, 0xc3, 0x1000, 0x40, 0x1]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000580)=ANY=[@ANYRES32=r1, @ANYBLOB="1a0000004aa934c9b722f0a16ebf9edcfae010aa36b3c8a658868a392b0e9e7845a2dc86edba1b54c1a35e14578c48170312a6e621e74c2a6afe37b5fecaf438f7871fd5b2e023e950268f545b960793c408ff3048a3d07295"], &(0x7f0000000340)=0x22) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000500), &(0x7f0000000540)=0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) r3 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f00000003c0)={{0x2, 0x6, 0x5, 0x5, 'syz0\x00', 0x9}, 0x0, 0x2000046c, 0x9, r3, 0x2, 0x101, 'syz0\x00', &(0x7f0000000380)=['\x00', 'ext4\x00'], 0x6, [], [0xdc, 0x200000000, 0xffff, 0x4d]}) process_vm_writev(r3, &(0x7f0000000ac0)=[{&(0x7f0000000600)=""/140, 0x8c}, {&(0x7f0000000300)=""/37, 0x25}, {&(0x7f00000006c0)=""/154, 0x9a}, {&(0x7f0000000780)=""/204, 0xcc}, {&(0x7f0000000880)=""/133, 0x85}, {&(0x7f0000000940)=""/50, 0x32}, {&(0x7f0000000980)=""/34, 0x22}, {&(0x7f00000009c0)=""/198, 0xc6}], 0x8, &(0x7f0000000b80)=[{&(0x7f0000000b40)=""/60, 0x3c}], 0x1, 0x0) 15:24:56 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000096, 0x0) 15:24:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa4, 0x7fffefa5) 15:24:57 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x100020, 0x0) 15:24:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa5, 0x7fffefa5) 15:24:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x57441, 0x0) r0 = getuid() syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000280)="40cf04c8476f78094467bc17e60da3752de6513252ab4ca459899b585d2139cb570305fe698e2d0ff6c21358e4b86391096d2973408fc3e428eb0339b73542e3c5e492d6cdd7ee125cc23f983de6048c25a84a902b49a56fa6a027bb597e3ebca9154b608b2ca9f8d6132649e12c2a310adc212171363e149237f04c9451803f928122c26b382d79fd908f51", 0x8c}, {&(0x7f0000000340)="dd447b3104649244ae2c72d9e39663d1886b020aadd003258fd49eb897f37a0cb31b02cfb48866a70f7088eb6225dffa89d89c5a03f189af26736c3c9048cb62e3deb93758999114b13964fbf60af6b1f3f4bb91e80412576045ffc6a6cd2466790cf7d88f323eceb8d05b87663a0b0f68ca2c861082d99c1f36c8f85df3d4a98153d0ba217e0e1edf08877b62130a39916b1e7b53c6f710d2aeb8e23d660ad163269745669d6267", 0xa8, 0xff}], 0x2000000, &(0x7f0000000400)={[{@type={'type', 0x3d, "fd79b08e"}}, {@part={'part', 0x3d, 0x4}}, {@part={'part', 0x3d, 0x7ff}}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, 'ext4\x00'}}, {@uid_eq={'uid', 0x3d, r0}}]}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000097, 0x0) [ 628.303322] hfs: unable to parse mount options 15:24:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000098, 0x0) 15:24:57 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf8f73f00, 0x0, 0x0, 0x100020, 0x0) 15:24:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa6, 0x7fffefa5) 15:24:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 628.439357] hfs: unable to parse mount options 15:24:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000099, 0x0) 15:24:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa7, 0x7fffefa5) 15:24:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:57 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfcfdffff, 0x0, 0x0, 0x100020, 0x0) 15:24:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa8, 0x7fffefa5) 15:24:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000009a, 0x0) [ 628.684284] EXT4-fs: 50 callbacks suppressed [ 628.684296] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 628.715058] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa9, 0x7fffefa5) 15:24:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, 0x0, 0x101}, 0x68) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000280)={{0xffffffffffffffff, 0x3, 0xff, 0x2, 0x6}, 0xfffffffffffff800, 0x40e, 'id0\x00', 'timer0\x00', 0x0, 0x87, 0x8000, 0x0, 0x7}) 15:24:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000009b, 0x0) 15:24:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 628.822711] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xaa, 0x7fffefa5) 15:24:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:57 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfdfdffff, 0x0, 0x0, 0x100020, 0x0) [ 628.993318] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000009c, 0x0) 15:24:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xab, 0x7fffefa5) [ 629.036903] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:58 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000009d, 0x0) 15:24:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf8', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xac, 0x7fffefa5) [ 629.158179] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:58 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000380)={{0x3, @default}, [@rose, @bcast, @rose, @default, @default, @rose, @bcast, @null]}, &(0x7f0000000400)=0x48) write$binfmt_aout(r0, &(0x7f0000000440)={{0x1cf, 0x3, 0x2, 0x244, 0x55, 0x1, 0x371, 0x8000}, "a48aea6357fe2982cbfea8851ba5ce0698b3d3f31bfc61420f10a22672f0b412ac0ec8af8f86477e1e17ca784663900f15cbe1e7bed53e45a761cfda81b2e2874352fc229ca257eef54a24961125169cfc19f0185edc051c32695db8696a187062b8f4f1e0593849d43ce39689790a7eaadb62021142846d711641ec8d84f0e195b95cd662d39aa1c5d0ec7f53cdf57a9a20d7bdd8b54f5031a8f01ed50f5ca015341ab6555d6f1d42671f30a3e4fe2fc13b500cd87fe9c1", [[]]}, 0x1d8) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) recvfrom(r1, &(0x7f00000001c0)=""/93, 0x5d, 0x40002020, &(0x7f0000000280)=@ax25={{0x3, @null}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x80) r2 = dup3(r1, r1, 0x80000) getpeername$netrom(r2, &(0x7f0000000300)={{0x3, @default}, [@default, @default, @netrom, @remote, @default, @netrom, @null, @null]}, &(0x7f00000000c0)=0x48) 15:24:58 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000009e, 0x0) [ 629.307091] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xad, 0x7fffefa5) [ 629.351480] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:58 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfdffffff, 0x0, 0x0, 0x100020, 0x0) 15:24:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000009f, 0x0) 15:24:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xa7, 0x7fffefa5) [ 629.486352] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xae, 0x7fffefa5) 15:24:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 629.560427] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:24:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a0, 0x0) 15:24:58 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100, 0x10000) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x14, 0x6, &(0x7f0000000080)=@raw=[@generic={0x5a4, 0xcb3, 0x7, 0x3, 0x80000000}, @ldst={0x3, 0x3, 0x2, 0xf, 0x0, 0xfffffffffffffff4}, @call={0x85, 0x0, 0x0, 0x10}, @exit, @map={0x18, 0x8, 0x1, 0x0, r0}], &(0x7f00000000c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000000280)=""/4096, 0x40f00, 0x1, [], r1, 0xd}, 0x48) r2 = msgget$private(0x0, 0x500) readv(r0, &(0x7f0000001400), 0x0) msgrcv(r2, &(0x7f0000001300)={0x0, ""/197}, 0xcd, 0x1, 0x1000) 15:24:58 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfeffffff, 0x0, 0x0, 0x100020, 0x0) 15:24:58 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf8', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xaf, 0x7fffefa5) 15:24:58 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf8', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a1, 0x0) 15:24:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb0, 0x7fffefa5) 15:24:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:58 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf8', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a2, 0x0) 15:24:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb1, 0x7fffefa5) 15:24:59 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfffffdfc, 0x0, 0x0, 0x100020, 0x0) 15:24:59 executing program 4: lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:24:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a3, 0x0) 15:24:59 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:59 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb2, 0x7fffefa5) 15:24:59 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 15:24:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a4, 0x0) 15:24:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb3, 0x7fffefa5) 15:24:59 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:59 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x100020, 0x0) 15:24:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a5, 0x0) 15:24:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb4, 0x7fffefa5) 15:24:59 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = add_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000340)="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", 0x1000, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000001340)=""/234, 0xea) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) lgetxattr(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00', &(0x7f0000001440)=""/179, 0x3aa) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x4) 15:24:59 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:24:59 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a6, 0x0) 15:25:00 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xffffff97, 0x0, 0x0, 0x100020, 0x0) 15:25:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb5, 0x7fffefa5) 15:25:00 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:00 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x60000000, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)={r1, 0x1000, "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"}, &(0x7f00000001c0)=0x1008) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a7, 0x0) 15:25:00 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb6, 0x7fffefa5) 15:25:00 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfffffff5, 0x0, 0x0, 0x100020, 0x0) 15:25:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a8, 0x0) 15:25:00 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb7, 0x7fffefa5) 15:25:00 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a9, 0x0) 15:25:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb8, 0x7fffefa5) 15:25:00 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x100020, 0x0) 15:25:00 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:00 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000001c0)) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000aa, 0x0) 15:25:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xb9, 0x7fffefa5) 15:25:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000004400)='/dev/zero\x00', 0x101001, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000004440)=""/129) r2 = dup(r0) socketpair$unix(0x1, 0x1000000000802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x400443c9, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000043c0)={r2, &(0x7f0000001680)="d95a340b615f573e6136f66f533145365dc793a98c26104865", &(0x7f00000042c0)=""/194}, 0x18) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000041c0)={r3, 0x2, 0x6, "84b62c84ab00e1b2e89250d386cadfb1b2827116727ca0de392ee66dcd0f07c7439a35cb57c98b14d30300e0cfdfc27997a5080d2f916ffa0aa5ea4b5d2fc55483664e6e3ecf04a23e5376e253ff436f91e96b0f884db03bdf2e9faf15c61577a00ca329a7f1ea470e5e9d13e0c91309acb0df927689621f713f5dc51b1c509524d051dc823b9c87c1b36fd6a5fcdf5c59f61769aedf7c47d1936e8b7757bdb08f14c86555c1dbea58328eb0fadb7499fb0fbc4ee01d564da83f682c2a6294278ec70d8bb65bf6027beb6ffa7800068b12f54143c99f7b2dec32f5bd02ff9de8b50c80ad4836524097e0e901a3557fbbd0db093d00cf"}) recvmmsg(r2, &(0x7f0000003e00)=[{{&(0x7f00000000c0)=@nl=@proc, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, &(0x7f00000011c0)=""/142, 0x8e}, 0x9}, {{&(0x7f0000001280)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001300)=""/237, 0xed}], 0x1, &(0x7f0000001440)=""/69, 0x45}, 0x8}, {{&(0x7f00000014c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001540)=""/24, 0x18}, {&(0x7f0000001580)=""/29, 0x1d}, {&(0x7f00000015c0)=""/179, 0xb3}, {&(0x7f0000001680)}], 0x4, &(0x7f0000001700)=""/6, 0x6}, 0x9bd}, {{&(0x7f0000001740)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f00000018c0)=[{&(0x7f00000017c0)=""/245, 0xf5}], 0x1}, 0x6}, {{&(0x7f0000001900)=@alg, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001980)=""/151, 0x97}, {&(0x7f0000001a40)=""/71, 0x47}], 0x2, &(0x7f0000001b00)=""/99, 0x63}, 0x5}, {{&(0x7f0000001b80)=@in, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c00)=""/217, 0xd9}, {&(0x7f0000001d00)=""/160, 0xa0}, {&(0x7f0000001dc0)=""/17, 0x11}], 0x3, &(0x7f0000001e40)=""/58, 0x3a}}, {{&(0x7f0000001e80)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f00)=""/185, 0xb9}, {&(0x7f0000001fc0)=""/219, 0xdb}, {&(0x7f00000020c0)=""/198, 0xc6}], 0x3, &(0x7f0000002200)=""/76, 0x4c}, 0xd1d}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000002280)=""/71, 0x47}, {&(0x7f0000002300)=""/77, 0x4d}, {&(0x7f0000002380)=""/157, 0x9d}, {&(0x7f0000002440)=""/208, 0xd0}, {&(0x7f0000002540)=""/133, 0x85}, {&(0x7f0000002600)=""/216, 0xd8}, {&(0x7f0000002700)=""/145, 0x91}, {&(0x7f00000027c0)=""/213, 0xd5}], 0x8}}, {{0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000002940)=""/22, 0x16}], 0x1, &(0x7f00000029c0)=""/4096, 0x1000}, 0x6}, {{&(0x7f00000039c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a40)=""/23, 0x17}, {&(0x7f0000003a80)=""/12, 0xc}, {&(0x7f0000003ac0)=""/164, 0xa4}, {&(0x7f0000003b80)=""/16, 0x10}, {&(0x7f0000003bc0)=""/45, 0x2d}, {&(0x7f0000003c00)=""/85, 0x55}], 0x6, &(0x7f0000003d00)=""/211, 0xd3}, 0xa0d}], 0xa, 0x140, &(0x7f0000004080)) sendmsg$nl_route_sched(r2, &(0x7f0000004180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000004140)={&(0x7f00000040c0)=ANY=[@ANYBLOB="440000002600240029bd7000fedbdf2500000000", @ANYRES32=r5, @ANYBLOB="0c00000000000d000f00f3feb3000a0004000a000400000004000a0004000a0004000a0004000a0004000a00"], 0x44}, 0x1, 0x0, 0x0, 0x8081}, 0x4000801) 15:25:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ab, 0x0) 15:25:00 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfffffffd, 0x0, 0x0, 0x100020, 0x0) 15:25:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xba, 0x7fffefa5) 15:25:00 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) r2 = getegid() getgroups(0x40000000000001fd, &(0x7f0000000480)=[r2, 0xee01, 0x0]) fchownat(r0, &(0x7f0000000200)='./file0/../file0\x00', r1, r3, 0x800) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2004020}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r4, 0x422, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x90}, 0x880) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x7fffffff}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000500)={r5, 0xd831}, &(0x7f0000000540)=0x8) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000001c0)) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ac, 0x0) 15:25:01 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfffffffe, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xbb, 0x7fffefa5) 15:25:01 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000001c0)) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xc3, 0x0, 0x100020, 0x0) 15:25:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ad, 0x0) 15:25:01 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000001c0)) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xbc, 0x7fffefa5) 15:25:01 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x282, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)={0x0, 0x31b, 0x945}) write$UHID_CREATE2(r0, &(0x7f0000000280)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x8d, 0x100, 0xfa, 0x1, 0x8, 0x100000000, "5debbf4c1effdc8e836f0b9d93300dd11d108bad804fa1cee19ec1abe5c67256e04c8da2bed9306d6edaeb020676de399af4585bf1ed319a428b03ea8d9cb839e859a341c30acc7a654d1b230e64766d08f3d78d9433af4b08db84a1c1337fc595a04488fd74cf5cb40c8c2b2f76f0355ebf1cb4fe7c7ed6bd717ab06a038b3ed078f5525c00a6a7479119cf98"}, 0x1a5) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ae, 0x0) 15:25:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xbd, 0x7fffefa5) 15:25:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:01 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xba, 0x7fffefa5) 15:25:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xbe, 0x7fffefa5) 15:25:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000af, 0x0) 15:25:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xcc\xe5\x1c\x95\x92\xead\x1a\xcf\x98G\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xa2U\x1b\xc8\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r1}}, 0xc) ioctl$BLKRRPART(r0, 0x125f, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/46, 0x2e}], 0x1, 0x67) 15:25:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b0, 0x0) 15:25:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xbf, 0x7fffefa5) 15:25:01 executing program 4: mkdir(&(0x7f00000001c0)='./file0/../file0\x00', 0x14a) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x102001003, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000200)=""/201, &(0x7f00000001c0)=0xc9) 15:25:01 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x10003, 0x3, 0x6000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0xc018aec0, &(0x7f0000bf7000)={0x0, 0x0, 0x709000, 0x2000, &(0x7f0000000000/0x2000)=nil}) 15:25:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc0, 0x7fffefa5) 15:25:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b1, 0x0) 15:25:01 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1, 0xfffffffffffffffe, @raw_data}) 15:25:02 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540)=0x0, &(0x7f0000000580)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f00000006c0)=0xe8) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x6, &(0x7f0000000440)=[{&(0x7f00000001c0)="b4c03360e80854a2a1ff049814ca1a4db3c1eaa1abc17704e0635831e629e9fbca721ab571e2695e2bcd2e2180eb3197c15a822e2b7176e3b1c250aa95849252d5f4cb60b113000398fd95e5308d0486696820d2c2592edce4eb422a673de6ab3dbb1016855e78f2e950", 0x6a, 0x6}, {&(0x7f00000000c0)="89184702cbba46db9e3f70c7591e617806e1331c8ec8ef913492b59a59b9abdd1fa80df1bcf5c5c0a90a2f6e60fc58f988fbd0e39b52232a61", 0x39, 0x2}, {&(0x7f0000000280), 0x0, 0x80}, {&(0x7f00000002c0)="c3c553377634cf982cffa3befc7a3b0376ebcbdde6cb2577104743a88a8433c43fbdfd86cd7a9272a0ac9329e60b65b7fd37091eb77d3ed1ed56c4380e7cae731ce6e75686a8552bc2a6bc1cb8d20970b520b6fdf59f77fee1f9aaf2b064d2d4733e2464669bfb8064c9cf2e649227dc34", 0x71, 0x40}, {&(0x7f0000000340)="125ca2b67c2baabda5f0f7cf2af168544b3cfc246400631e8b33453e389b662141fda0a3c1712d03540a79068ddf46596db6b189cdd21cdd6cf340d139da7349ffde02b9b6f31d8a0d651ec2649dff8650f6a247da0f4d8b78a2ddbf22ab85a6c8bdd350ed0504ee69a7e5e4da540fde6bb0d9a9c43c27e0eddfdaacc2fd133aa15b91a57f2a081fb034dd56e711a641d0e13c2e97f880307fbb1faa4e4b1d5dcdff8dbee96483", 0xa7, 0xffffffffffffff11}, {&(0x7f0000000400)="48c203fc9a44a053a5448d86e6a89db8e178592e33c5645d90ed6c634a13e2693a507e1d3c", 0x25, 0x8}], 0x80, &(0x7f0000000700)={[{@flush_merge='flush_merge'}, {@resgid={'resgid', 0x3d, r0}}, {@fsync_mode_strict='fsync_mode=strict'}, {@two_active_logs='active_logs=2'}, {@nolazytime='nolazytime'}], [{@uid_lt={'uid<', r3}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '%procGPL'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ext4\x00'}}]}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000007c0)='system.posix_acl_default\x00', &(0x7f0000000800)={{}, {0x1, 0x2}, [{0x2, 0x6, r3}, {0x2, 0x7, r3}], {}, [{0x8, 0x0, r0}, {0x8, 0x7, r0}, {0x8, 0x7, r0}, {0x8, 0x5, r0}, {0x8, 0x2, r2}, {0x8, 0x3, r1}, {0x8, 0x1, r1}, {0x8, 0x2, r2}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x1) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffffffffff7, &(0x7f0000000280)="bb314cf584af25203a05076cc7319e8024a0c03687622a43ee08b2d56612fd2ddfc09f869e8b6018f9b85d2274057f9f006e38eaf97bc135ea3fc9800650081736acc61786a374ce9c5847cd66ed22d4b1984257302253847b9bf3140f2a45b7271af53d2ddfbd778309170d67c046f0e85029825cc86e70c94c6f8018b8a49b54639293ed80bbd2828aaff3f7b54bc67d959212189ccada5a3317e37f1f7bdf87b5a41450696a2796f7d0a92366558e366454a03e755835") mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x95) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x3) close(r2) 15:25:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b2, 0x0) 15:25:02 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc1, 0x7fffefa5) 15:25:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b3, 0x0) [ 633.258266] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 633.279489] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 15:25:02 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000031c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f00000032c0)=0xe8) lstat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x3f, 0x3, &(0x7f0000000100)=[{&(0x7f00000001c0)="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", 0x1000, 0x5}, {&(0x7f00000011c0)="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", 0x1000, 0x5}, {&(0x7f00000021c0)="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", 0x1000, 0x8}], 0x1, &(0x7f00000033c0)={[{@statfs_percent={'statfs_percent', 0x3d, 0xa0}}, {@commit={'commit', 0x3d, 0x7}}, {@commit={'commit', 0x3d, 0x3}}, {@rgrplvb='rgrplvb'}, {@loccookie='loccookie'}, {@ignore_local_fs='ignore_local_fs'}], [{@dont_measure='dont_measure'}, {@uid_eq={'uid', 0x3d, r0}}, {@fowner_gt={'fowner>', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'selfem1selinux}proc*y'}}]}) r2 = socket$kcm(0x10, 0xd, 0x10) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100e00f80ecdb4cb9d91f63190408000340000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) 15:25:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc2, 0x7fffefa5) [ 633.321618] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 633.357235] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 15:25:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b4, 0x0) [ 633.389894] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 633.417029] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 15:25:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 633.461501] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 633.478868] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 15:25:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)) fcntl$lock(r1, 0x6, &(0x7f0000000000)={0x2, 0x0, 0x7, 0xffffffffffffffff}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x2, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000180)={r3, 0x8, 0x4}, 0x8) 15:25:02 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f00000008c0)='./file0/../file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) msgget(0x1, 0x60) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000a80)=0xe8) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x95a, 0x5, &(0x7f0000000740)=[{&(0x7f0000000280)="4890f37f40c758e734a037762201649f8f09976513c602d6e88b118332677d2f2fc99ee0c4362c0d995dfc9b0b8846605a5d3ea21638ef475dbd0bfcf2eec2fea4c115f9df65a741daf9721716052ea6340a53ad2b4151218077e16e219d3725e88c440c59fba241cd1fba5931a2ba8e6d0e27d1843b1767f4eb3d546d4a451755492d4f1b104d345a6d82dd7b863f3ff575bb2e93549388e8245b90b2e3d4825ea4c4f2db1c13779cd3046e1418e0854111eeb4df86a89faed202271a62e1ea685e40", 0xc3, 0x5a1}, {&(0x7f0000000380)="6b84c5178f12d1d482451868c3d2bfd5e7b692dcfcc03c29bc58e7cbb084cdc2c54d9c063ac7027a4bbdd554e235297011828d59dcc219eabf16a5d48de53cbf8fb06363ee8cbff413eca1aa379cd1bbc2550ae41c8f7d0db07fe44e41ba454897c40d1d9b2de8f3a7a0675d187a381a0d43845f8e9387a59e0b71e495fddf08d75087cdabf1960e1e0fc2448cdcb67e30c8bdab277c6e1cd943d1cd4cac11e232158484f86325742d85828ff50d5cb93b776f76e462b905afdf026a80280b5f6ef867b55047994b6a3ae2d59c1049e7bd54ae97223c33b0856f78427a118194b5ea2a716ae71782c0487cb5ca5bea83b28e1f82212ed580", 0xf8, 0x101}, {&(0x7f0000000480)="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", 0xfd, 0xffff}, {&(0x7f0000000580)="119872725bb65649772615c7350e6a2d3e9ea2eb7e3b08b0e54f6cdd67b0956f618c2ea20500b50bbdfbe7642ee2e73fb0633af2463ab5ba2b816729ae15d2f94e03c3071aff94c96e72a2057eea35c3c9e01c6a94721779cddaa3d8eaadb287b2df740aca82edba8a50ffa0a1c85f5bce8d7fb53a6dbfbe262e4dc6e3b310ea8393be133839b7786dbd78a152ba4744b5e7f1b96953f790444f43fe87a47f1e454a08b07bfe4dbdc20dedb57455c09941b403", 0xb3, 0xaa1}, {&(0x7f0000000640)="7b0bcdcffc0898365ac4ab262884fc5f603d2d18fd66dbd2bc5585f24aa93a481b6157440eb4f0a1b8fe325816d20faf3559eb42b8d3743c9c35cb6634505fcc1adbeb6f98a7910ba9cbddc804adb8e09063f862f09adcf283c2b6b8708dca177ca7b697798177888f84ef6e39fe04ffa4e345f4d104711d16824ac0a82658cf16fa6a00f8dfefbca124386db9a1e94bddeb5204cc733c09f62c76c7e05e8221901885315af2d594c9d127a6b5cc983ec6baaa2d6cbf1930235c141e90da1d95065caf1e2400b5fce18060a00fcb74e4fe7b6c0edcdbbb80e745493009dd2292", 0xe0, 0x5}], 0x3000, &(0x7f0000000e00)=ANY=[@ANYBLOB='barrier,nolargeio,obj_user=/dev/ubi_ctrl\x00,fowner=', @ANYRESDEC=r0, @ANYBLOB="2c736d61636b66736861743d287b2c646f6e745f61707072616973652c736d61636b6673666c6f6f723d2f6465762f7562695f6374726c002c657569643e52b616f9142aa7bf10394256d0a44bcdff948ce8f0761792", @ANYRESDEC=r1, @ANYBLOB="2c0b1d9cc2b0dd64d67a6d670a55ed5a2d59516f9dbcd8260db79661a2a6a8438e5dbf3cb6d305d1c1b7efce0c59469bc1f495064aa1169b7bdd0e45570d8f020e7b5fe12eb277aeb4cf933e90fceb763ecff36040a49cdca893918c", @ANYRESDEC=r2, @ANYBLOB=',\x00']) r3 = openat(0xffffffffffffffff, &(0x7f0000000dc0)='./file0/../file0\x00', 0x4000, 0x20) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x40000, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/capi/capi20ncci\x00', 0x80100, 0x0) connect$x25(r4, &(0x7f0000000bc0)={0x9, @null=' \x00'}, 0x12) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f0000000c00)={0xa953, 0x4d, "d3cfb35b5ff3caeb0a37f5aa1b5b473ceff3b708213f97df38bd1349bb5a1be621598367dd5ad911c7af008ae1c7880b48124f2f23728c29e82c9b32a1cfe351686d8af1632cdbdda2bbee876c"}) r5 = dup3(r4, r4, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000d40)={0x3357, 0x0, {0x3, 0x1, 0x3ff, 0x3}}) recvfrom$unix(r4, &(0x7f0000000c80)=""/182, 0xb6, 0x100, &(0x7f0000000f40)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r4, 0x40045730, &(0x7f0000000b40)=0x9) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x260782, 0x0) ioctl$VIDIOC_G_TUNER(r4, 0xc054561d, &(0x7f0000000ac0)={0x200, "bcd30e5c0dc7a275c186cb29f9c364822811dd958c91c187f8eef11b3acb1a2c", 0x3, 0x602, 0x7, 0x6, 0x8, 0x2, 0xfff, 0x7}) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f0000000080)={0x2a, 0x8}, 0x2) 15:25:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc3, 0x7fffefa5) 15:25:02 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b5, 0x0) 15:25:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc4, 0x7fffefa5) 15:25:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 633.694624] EXT4-fs: 48 callbacks suppressed [ 633.694635] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b6, 0x0) 15:25:02 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x10000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc5, 0x7fffefa5) 15:25:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b7, 0x0) [ 633.913994] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc6, 0x7fffefa5) [ 634.028508] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:03 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') sendfile(r0, r1, 0x0, 0x80000002) 15:25:03 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) fchmodat(r0, &(0x7f0000000080)='./file0/../file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b8, 0x0) 15:25:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc7, 0x7fffefa5) 15:25:03 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x100020, 0x0) [ 634.583048] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 634.590300] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b9, 0x0) 15:25:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc8, 0x7fffefa5) 15:25:03 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_raw(r0, &(0x7f0000000000), 0x10) bind$can_raw(r0, &(0x7f0000000240), 0x10) [ 634.629483] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:03 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1040}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x40, r1, 0x210, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000000) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 634.722256] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) 15:25:03 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ba, 0x0) 15:25:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xc9, 0x7fffefa5) 15:25:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 634.925287] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 634.942597] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:03 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0505405, &(0x7f0000000040)={0x1}) 15:25:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xca, 0x7fffefa5) 15:25:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000bb, 0x0) [ 635.032798] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:04 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xcb, 0x7fffefa5) 15:25:04 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) acct(&(0x7f0000000040)='./file0/../file0\x00') mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x46501, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000003240)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x82c, &(0x7f0000000480)={[{@nfs_export_on='nfs_export=on'}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) 15:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000bc, 0x0) 15:25:04 executing program 0: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) 15:25:04 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xcc, 0x7fffefa5) 15:25:04 executing program 0: syz_execute_func(&(0x7f0000000180)="3666440f50f56664400f9f3241c3c4e2c9975842c4c27dd34f008787420fe2e33e0f1110c442019dccd3196f") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) fcntl$getown(r0, 0x9) 15:25:04 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000bd, 0x0) 15:25:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xcd, 0x7fffefa5) 15:25:04 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_open_dev$evdev(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 15:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000be, 0x0) 15:25:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xce, 0x7fffefa5) 15:25:04 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000001540)=0x4, &(0x7f0000001580)=0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6, 0x4, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4e}, {&(0x7f0000001280)="c6a301681394933ef0aed6b95af80aa27b7622d2e10e437faf49aecf1f47168dd94c222bb03e9b3ab62621a0cd4040281b2f88e6618cbf04a4397281eb4a2622bff3e2728cb4df28b70107f00c05777449688d7781d8d99798f3859083ac7a8e13985a58045072e0d67df8d06633da81cc66167bd6b342e3884de2c5b011d9541f637af1531f620a416fd778efb62e584d1d0691be611ea4f371c1f4d83ad978e1ac55816156855e44ea69d1b4e0a09e", 0xb0, 0x5}, {&(0x7f0000001340)="607b6ba5945e7e27741b1c2c3b5cd2153a7ad462cf0b540db19316e1e26db3f4dfbd79c58637367f18c778104dbf6df782b1ab78ef4079f2f96fefa429ee5632bc72413b50cfa9b98779aa3df62e9a51ebb47d387f754678e1c32eb7f2a57ae1bb7804a70554e45f95e873bd85aad89adf63363649a856ae55231f83d966c538912d0cafcbb41e6d6fb5ee3c1c65330e988c0b8473b7718215aa634004f02954a081443883cd5c7a5b16226f16ff6d0e4ae829990d27e2558ed215bda79d", 0xbe, 0x7fff}, {&(0x7f0000001400)="c19ed8ef14fb16b8a78f628c6e015c18fe82b0ea41ccf5a3562451d32d9cacd8e6bc0c6f79c92f37ab3170b7ba2a6ea2f656fad1008e674dd29fe01f507c155c56d180b8376be86d2a25d2271558ee3df9f50d6f3030495b1c2650e631230c604301cebb77b08420304796e1e09988b31a7b0e39f097a001c468f3293cb4753eb03e3a2a96597cba5bded5e84ef75969a53369", 0x93, 0x636b}], 0x80001, &(0x7f0000001680)=ANY=[@ANYBLOB="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"]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:04 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:04 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000bf, 0x0) 15:25:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xcf, 0x7fffefa5) 15:25:04 executing program 0: memfd_create(0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x8000000) unshare(0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x800000000008982, &(0x7f0000000000)) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000140)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) 15:25:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd0, 0x7fffefa5) 15:25:04 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c0, 0x0) 15:25:04 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x500000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd1, 0x7fffefa5) 15:25:05 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 15:25:05 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x654, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x49280c71c7ac38e0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x117, 0x4}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0xac, 0x42000) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r2}}, 0x18) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f0000000300)={0x0, 0x5, 0xffffffffffffff01, [], &(0x7f00000002c0)=0x9}) 15:25:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c1, 0x0) 15:25:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd2, 0x7fffefa5) 15:25:05 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x600000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c2, 0x0) 15:25:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd3, 0x7fffefa5) 15:25:05 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x3) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x100) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha256-avx2)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffe81) 15:25:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c3, 0x0) 15:25:05 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd4, 0x7fffefa5) 15:25:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c4, 0x0) 15:25:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0/../file0/file0\x00', 0xfffffffffffffffc) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x100020, 0x0) 15:25:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd5, 0x7fffefa5) 15:25:05 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c5, 0x0) 15:25:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd6, 0x7fffefa5) 15:25:06 executing program 0: memfd_create(&(0x7f0000000100)='\x00', 0x0) pipe(&(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000a0000005675ad8db5ef94859b360d729a4121218f12b8f431f3913c654c48a877eb9782000000"], 0x2b) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:25:06 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) 15:25:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c6, 0x0) 15:25:06 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd7, 0x7fffefa5) 15:25:06 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:06 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/../file0\x00', 0x2) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) fanotify_mark(r0, 0x32, 0x2, r1, &(0x7f00000000c0)='./file0\x00') lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd8, 0x7fffefa5) 15:25:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c7, 0x0) 15:25:06 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1a0f000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c8, 0x0) 15:25:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xd9, 0x7fffefa5) 15:25:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x0) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x19, 0xa, 0x20, 0x20, 0x0, 0x0, r3}, {0x0, 0x0, 0x239cb53e, 0x9, 0x1, 0x1, 0xf4}, {0x7ff, 0x100, 0x3de, 0x8}, 0x97, 0x6e6bb7, 0x0, 0x1, 0x2, 0x3}, {{@in6=@local, 0x4d5, 0x3c}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3501, 0x0, 0x0, 0x3, 0x0, 0xffff, 0x36f}}, 0xe8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="6b9254f6656d2e2c63704e17df006563757279250000007b316a405ca9203012c3feb2226ecb1c175510e63817eec8efeafe467d99822e9c22c32f924e"], 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 15:25:06 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:06 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001480)='/dev/autofs\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001500)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000001780)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001740)={&(0x7f0000001540)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r1, @ANYBLOB="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"], 0x1c8}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r2 = semget$private(0x0, 0x3, 0x180) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000280)=""/205) 15:25:06 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xda, 0x7fffefa5) 15:25:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c9, 0x0) 15:25:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xdb, 0x7fffefa5) 15:25:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ca, 0x0) 15:25:06 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000380)=0x1, 0x4) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x10800, 0x0) r1 = add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000280)="1f6a85984360af9626b3563503a67cbd896ac8e72bbbce4978d12f8ea0ca77b8fd3cbe56ad3975345e5d22bd0e65d2657cba416dfc3a4a94410f22f1117954f382fdacc12bc50e00dfae0cd9d21524e6f10303a4188a3eb7c38ed166e1c2fa00797d89f47774a93d34319d76e2a828ddeda0d17686c642f9dc12278066f972a08b3cd9cdd86ef377c0f631243ced2497a8e36268ad0b41c4e4ed1bb6ecde77624fb3adc1a1a8c6b8cbd315d1b76db027d41a4ed1fa433c36ea9052329b154d628649658ddc17ce92800b946b447938b92f7e72f361e3cd1f12b8b60485f4e6b8913580", 0xe3, 0x0) keyctl$describe(0x6, r1, &(0x7f00000001c0)=""/85, 0x55) 15:25:06 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xff', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:06 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2000000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xdc, 0x7fffefa5) [ 638.084103] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:25:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000cb, 0x0) 15:25:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xdd, 0x7fffefa5) 15:25:07 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000140)='./file0/../file0\x00', 0xff, 0xfeea, 0x0, 0x40000100020, 0x0) 15:25:07 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2d00000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x0) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x19, 0xa, 0x20, 0x20, 0x0, 0x0, r3}, {0x0, 0x0, 0x239cb53e, 0x9, 0x1, 0x1, 0xf4}, {0x7ff, 0x100, 0x3de, 0x8}, 0x97, 0x6e6bb7, 0x0, 0x1, 0x2, 0x3}, {{@in6=@local, 0x4d5, 0x3c}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3501, 0x0, 0x0, 0x3, 0x0, 0xffff, 0x36f}}, 0xe8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="6b9254f6656d2e2c63704e17df006563757279250000007b316a405ca9203012c3feb2226ecb1c175510e63817eec8efeafe467d99822e9c22c32f924e"], 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 15:25:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xde, 0x7fffefa5) 15:25:07 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x401, 0x8, &(0x7f0000001640)=[{&(0x7f0000000280)="820819a1a9d14c234636dae6d4bf9e2153be059576f692ddace538912058ba2c38fd4bfadadfaf43bed6b4eefd5f00d282d46b7ceb4e43b02edfd8d137aea8d5fbcf042f20aa49670796722ca1caea8045f1c43a973afd8e89a20a8ea9ca476debac06fa08387c66123c484e178c18b2df27c97a97e78893782a825c34d6fe4621ab1d838eddeb0bd66f7a9b83c7757bc19358458ffe2a22ebf6af79c8a613e09e6fa37540f5bd6d6cdfbde682878ba4545ebf5d8a822eff02e14b7c6c27644d912a99514692df05ef89f427681e14b3fd96324db460751c46f564196b8ffe4426b2c9edb3daaa2a8f14e1018e2c2ccf583357844e855b1a13c911a87e1fa7de6c6abea665a5d194f8ffd7f0890b265f226933d56ff3491d53d5d6a55e8dbddae0aa6b3e0bab55efff6af39d6486d4756da5f985456f21bf65b0e72d43f0e2fe7f44ff308bec2ef2bc08b2edf61d9facd8a0e88e6ed86dd8386e783527a144680a396839e3d56e2e2cff84b3b687b7e73f6133cd3d02148f8d93a341c1b817558bacff376e0fa87fc59c677081cb7ee2a9895829c452c2d9278c5c5812e51629298235010b48cafd38bdad1d29f07b2e2f6f69e6b277df4ebf9e7bd234e40dd409e13bd62b1d033a946d25c4b52657e2c0858b7c1e66a497bcf30fe90d20af49349815f0141b47ca648be68faf6ad488da08a8184a7119805d185545e283b78140b3f37e124e0eaaca742cbef2671bae0b0d23851998c446835001f5bdc69d0f32c27c5244354db7ece993bd60f2a4a2aade8654797b0bd7ff7b548fd6df67485d7f0fc328721d7d2a12a124b4b7d7b47ac5f90edc6c8df8c607140089ea7721b4f242925fbafcb40e13544cf5c5c298260fcede3076b21b146491a50b71b3efe58a5c0dacec45d2664182a0a1c28b9a29f628eb86b2bfd75f9d6e9f1f29a07ab1adb979d40eb9c96f9ab9fd23fd665b1aedbdcc3b08d6539f424b57e7715d66da356a711e2fddf28a08ed935e4c96edfcd25cd2beb3b17b6417ca599ab46d788dde08195a0a717a07368f92b0829b71dc8cdda4ef3e3e33c11304af35c34b72f87d7ee90e08de85601affd8cc6e270bdf00107e00404e108b16f198e656b5acd8a45e6917f89eb4cf77776914d17a9aa6640f31b2b95193ac5103ff4d5e36ca5473cc3a2e23a59bece17de3bb03aebf7bb5045d49848c30463bba20445b95441e386c5fb4ad0185f79ef89d0caf4a998be7c7b285a8d84f8ae5b8b3dab2a0a242924dda898565b2860801f52cdfe72195de10a17cceabaa834d6fc69183c10ade2827b4d7b4a47cdf118a64bdbfd5791a9a3b285142e7f237e7d0e09e676570948226a0a1aa37035324f502de9f589cc80d02a77333be6b852d49af4b76a22299fc0acae167327618cc884c2519961602e508cd6b1de39907648fa278c6acc5f3128de9ecb93c76f16f302e9fb1f17ae262643160ed569e24dbec33bdda4231ed1ad73b9b037ae27eb0dba6be3d38763263217dcfbc905aa8de61848ac31aae33bb55234dfa84b51f93e0b36a21e711d3fc8c17ab48a402b341265f667385ef736f3316ac572f57a572f9ac875f0aa15141be85f878f484d6f993b564a9bf7c5b08390ce7d25fc4381ea218a57e544a81c9e6c655955c642edb97d8d4932845a1a4a239149a4bd5bd2472237d69373bd0d836032065ac6b83f412134f34e08a6c5c2c9be34ef6f5058c34c5a661ff8b7f6361561754c64c67e4ca0174928f3d27251baf94b90524ac07ceea71d611cb19c2e8907ca03e9213866ba776c59348c3bc5edcdc25e65333c161b29fdf21c6b2b0dfc9f1c30ddcb93cc6189ffd18ccb04dd383603edfe1a6126e4b8054c73f044aed95ef4c7fdff9490a765b2bb5c6543a7c7b8841379890377111072634f73a106044628b2d45c924431676b594e08e52e59a1f89ce041db31af2ce8e7f65ef84ed3357fa68ba6d970be0023c0ce245b0abd67e962dc3fc4d63a787de4466e16b3aebc639660c163c1def77dc49a9be4d0315eafb304845abbe53dc8352a4faa602ecbda0cb91107745b77f13ad56743c37ebb122eba4097c921ec399ce6c71340eb143bb9d81dabe3f0e784703421ecd3debdc7d074c5469d9f6e15bb4241c38c7987d406488721bcd5f6e32e0eff34077c045211c1ea39deb28664b3fade2ffe4b01fc3171e3b03a2001a044fb649d951817429c66000af3fa5b8f89ae1d9b3f447b61fa9640fefc1b9c12276613b0e14cefd22c397ab81952f8ff142b8ab5d08e8996bdb3ffc20d9ead7b4eb2809c8fa4cfe9e021eb5fa52e2c867307742f28346887627f3e00ae6d7cc10bf6c80c7c08937d1dde66b493eca1d3bb23e46672e7b920ff0d5a25dd2ed6ba28c7822378e87e54aef85a0f7ef87115fed1ca54a65ae5d8efee48a6c0a24c66172c6132dbdae43ecf871040a23cc168ab5ff9732c22f63a5a6c19d9d32f6c883162a75ab40f684a380d69f7dd7e58dcd91840c0493938038e13528eb42ae8909a056c9bf71db33c91521ade53f4bc9a56eb1c82a439725f28ca012b6b13a5d47d6ac0a0e9ac7fe16b91dab70c948611a90cf19aa3068d53b752d44cbb0b3384836c206f5628901bc44566cdeda338fd3ed8f24239f916f3cb4d61e17290bf5223906740a3ae50d7fbf0f005dd279c9f87a9ed8e992ec0f0b7bbb5b7b13f2e0e033e0c41675e4856758ce054e55672c9450c3b66d5cafd6b6b0d62f75bf99f6d3010779c2e3b6bdcaa7810d146eda13a099c788827bf1131390b9a9e30d653da63f7b6e8be584382c931b97a45ed9b245c7624a016014a8aba7660810ea2609236cfab0430841c69069a30e0145b9d50de9f895af970730eab09612bc6d4fc1d67650d210197e8eb18127e0e63f1e31dcad9afccbab2e7cfe5b2698f29cbf5f76fbe2ee0015f5ba1096951ca4d575d32bb447e019c0de829b9794dceb7e418f655dae9c57950ce5dd88ca971ec1910eed6c52facd8ee0c96545b7713a3e486570c2e1d09be3e4b38c5a587409408f5734d01c0558ba59a8259efa13a25eed7d19aec3772a6a0715d66b7c6b9b21cbea7ac10d93b95d2c032ecc68bec7081789a3f58bd1cb3c5ad19a4e5c58c5a54e8b388bac6582aa7c229809a3a1e6fe468effc8a39083ce7a90153245b3fcc6d5cc6d1d816ef2d26dfb601f73257d7c2be972b247290a8b98e5859213af47da0861bb62b362debe9b50b6660c01e1eeb05b61850b2f24377d512070508d01447faeaef31c9b37bf770d8c950b93eb0b0580a4a2c1c8b979ef1b746f5f31bcbfb34914769314b12f799a61d134324e9b9ef8ea5529f32010448202723711b3d00c0f21ea6ab330ea1645c712b0b6d9cc4a9baf4336126ba8c1a9df86f29db18507eed3228b0c143309d63f2d6d0e26439dd72de0da2aa020b96f62434a6adcebbf080ee8c86ea8933f428b03af471b4e5914203cc703f6425fe84884394698fa98ea77331aaf705dac9685706c7382d09a71c43effb69f67b8fbe1a709017460c83f089da18c226fde850bd18ec1c7eea6b6004ee197e4d657d5542e25c27be4a9bf393569b586b9624e965cc2896ee0d0db62c3dc7545957b65f738732070bb0251f5290e8eab164b90e2d91a349b678125ee2a62a880bcf7a3a0a82cb0f2c4be4b4707edc228ce229bc3da786f1ce3c8d6b60f26d61df2f60a0404e035770870abe2e2ebd98a27402f329984f47f0291e38572bd7accaf78c7c6eff296f5f8fd2648494002be9a25bf05061fe53971e57eeab6118b2109ed196dd54912e49b17c88b75c0f4ea7ea35407f62035e91e7b2465bd851f03b5781cca559bcd08ad5d468073369591d70cc42d00f67384e16009ad5803b593551038f1dde475b31228ce41e0445871f910de9adcbbac5f61dde1eecc14cbf62a85b4f0873c29e293d821770de29af510da86a2bcecedca926e4cb5c50635f2e18bfc9cf2b5872ebd6b09660f285e20c1b8146e9ad95a1fb649011a98b9915c25a660c3288d17fa7133ef427099547aeeb857c314cdaa2c1eae30fe8f31f74ec1b3a82dd78abf492444843969710595b842ac701006c1242863d230ee110f10077961a083278638feb140d7a20df43943bc055cd183dea1fa78a2c90911fa7badb6992f6437dba4edbbf9f47ecbc2bb9ba44eeba20898ad8294011eb568e1042f01a6c73e08d305f62d9d0fcf70b6091afa402f7a0b749953480c8ab786a23e5381eb4a209da8f98bd0342b386517e89c2c50665eec0ab950e955af1c0be4792a697222e44697971e6aeccab63abd5e366c10b8a0cf58773ca7f95e3f10d8dd54f9230bdb0285e7627de57fcf7577939e77116c09663758c82f304866c6c8c5d9bd9abc789c4ebae8f5529ebb25dc003baab23251e95405a127343d24077d2bd2c30c86e9d6488fd5dde8656845b8b1b00f4904ef61f99f1a00a74715dfb69b111e39e5e431767d267a58fb3e7cbd255b985c3abab7c2edba249f6a394a8db130e75dad898176a25f46c0a9b6cc3ac89e487974a7d454be6dc371091b55e8b4b1a5a853cbd880a11d2d76e4098ef209455f333f4c3287d697d9b30fcc4a3d6582e1c0302211006c977a9156cab9443c631386f26906d619df09baea3dc38720d6b69926b071d0a6d01975cb7010f6631c7f7169421a2fb61343cfaa50d63e72d7533766536ed705d583286d95d5a2b0e9192623014f8767476b2a3e838508cda4d769ef517e1949809770118cbe38c2d6b857767724fbb098cae41eb3871c0686f09b3a6e7acce8dec29f411fbffd8e055966c873d6a0dbfd2293ad6c9d37993cadac3cba778fb60b2366b67073007753258dd4bf3e512dc72894f1b4d0d9e2ccbc5b84c8d1b23421a9670f048ec57b6a88ab717a33ae9450904450dbae1afb7b467551fe671e7903f1fddb7a21eaa1f75e16b9598dfca904ef5e64f6199ffa83a6ffb766d26b8687d7b1551cc1838122873e92b300b3fbe53a439a68c435f1f2fd42ea2a45aac3d4d9fe39b5ff7e22c525a23b2e481e533ad2382a3352152564c246af71161f25e3b0539f1b07e0586c1882b272c8072a4ee10edff33713f531d56347c0a94912377c9763a49a6da5f9f43dc8db5c386a33d6478d1c7137622b48da3cbc0fbc1a1a84949b5970e6527396a83b09c7f2098fd720df52f89c5287286442cbf9bd0359e3a26323e430d6114e19b5a2f1cf58e53b6bcc7d3839d934ede105700df8392219c64f1690d1148c7eefac6e1dd7535c55e78b1782b9983f760e9447c3c2847239f5ac95935fcb0bc54b65b2f7073879aa3812bb31bdfbc03143faebcf0b23235deb9ce1b33ffb92dfe1ba6f29c026aa2742eaa0aa72b4697f34c7142aa31342a5e3fa67a28cd3396c71eabf7e04178746e21a8e9eb42fc86e786d13aeea3c80b1b741b9265c5a85980192e2f9ecb7ff97bf1fea586c623a2d48a5c472359fa4df38d89837737708b8c7cd4d96c3281cf266d4272bbb445c921aed39ac030984a8a1b89e12d454e29cb11d56ecc5cf5eea2fe57197e2bda6abfdfca9e0cdc78db745b6b4f5a9866bae4b65915260056e842225e82cb1d5ae7a3d6b34bc3a50f0564cf88bb5fa0f928c64582a6cbe900307387ad73297570427b85e263b05b516fc97074a1510bff1a53f826ae79fc0a705e6614acc2c9c78b80105dc42ad125cdf61a885bca811204d0602393cfcd24bb74f9f6dba950bb8ed64a98c215de1cf113746796525dd3d14f0affbc3bef4a386f6bfa882", 0x1000, 0x200}, {&(0x7f0000001280)="070884225d3b7940ab8edf27d1fb1057ee2cde16ae5b5821df00844f68654e7f748fb0eddce06dd98fea79c0fca5776e1ad9e87aa09dcd2866744ba3f112f85a97011b2b1cd4a54d8069fece493657003ddcbcd3d50ab3383916284c23337611a980b18a4aec51f04fd5295d6fc4b10b1ba99b9738edc8ebdb5bcff60b0fdb65988106e7c6bf55d2aac9ec4219c86c276e2638e46969c31826586cc82068e786d81598a291eabd850aeead63c1251845958d37dbeaffe76798e855e70b7b28eaf8a349680a457ba33dea926da4f6ac9b934ec8acdfe1bf96ddff0253771031761feb120766303ecf2289a799d3c76375ba37b79d4fc832", 0xf7, 0x8}, {&(0x7f00000001c0)="bd48302d98338b52084daacd65147066591671b24196dd8ef97400dcd1da13a106337a4c177bf7619a54b3bfe13fbe9125742a9cd19b8d865322420e1e40d426488ab0c0bde2e2432aa162d2e5356270160fe2dde335babb88d516efe16ce2f7209480ef93fe8dfc670dbdd118bb2f1c1f2d", 0x72, 0x2}, {&(0x7f0000001380)="b42a7c1ece22e2f951b0fbe174306f613ff393239c43a2d203818ae8db0ef17b9a2e3de4da7bc6cb76ab16c8f0827b3e17fac30a891f0c2db7e4c3457e1329cd7b2bb6ebaa0ca2f2e0d24dd2ed8fdfa96dd34734bb795ddb2d", 0x59, 0xec74}, {&(0x7f00000000c0)="fea26031fc8cea9bc03894dbce2869635b7de3cec27a26248cde98c895d44a4205c00fcd198cb6ce", 0x28, 0xffffffff}, {&(0x7f0000001400)="131f127eef3614fa7e587fa5c662cf6af0b2146c725114ea1c9a370a954de2d413509ed87f329bb7e8b2f7a50ca1248bcbe0ef07443cd31814f3ac305f57fecd3c98e43c2d37b67d8b64e132bb119055873f681e1866ff407133fb3363f516b368f34f0fc05f054159e61d460e422181207d9c94bcc12d1cb1e27ce89ea43c1a739950142b98768212fe98c7b33f3614ae3bfd6a059cb605afb43ffc032c0c2d10d3c6095267ea9efb36b4772e230f2dbc951ed637954d8f6a651a1c5155145a6fbdad0e896ee40ada57ca84c9a2", 0xce, 0x22}, {&(0x7f0000001500)="8c2ea608a11a3dfa41c60f87a023c4ce042afbac0227953283c36469a7d813c9b5779c1ed38481ad042bd95462a7c391b8becfcc72da44f29e493b090a22389f1e40f9fbbc9058cf73619d4ea8ba3bfdf3cbdb30140998a059e545c6bec4913901e82681", 0x64, 0x40}, {&(0x7f0000001580)="3efbd922e147f11184ab003540fae0156ac66b42cf94b28b00202501bce055d9d15afdddcf6aa8fb1035cf2a556e26c95cd8dafda3f33ad106ef81e01346f2c7308e5dbba30404bff7bde41141bc2401d4e87b58c53c9ffa9a99759885c54bdf48e9d271c0378955ebe599ef24316747f8e566779a6243714947de3f49dcc22f177766c232c41a45986f23363d690f5e096be3147a3c97be17ec3e81e39e5844fe973b727ea94036dffe", 0xaa, 0x1}], 0x2000000, &(0x7f0000001700)={[{@shortname_win95='shortname=win95'}], [{@dont_measure='dont_measure'}]}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000cc, 0x0) 15:25:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xff', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:07 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x100020, 0x0) [ 638.760027] FAT-fs (loop4): Unrecognized mount option "dont_measure" or missing value 15:25:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xdf, 0x7fffefa5) 15:25:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000cd, 0x0) [ 638.847552] EXT4-fs: 40 callbacks suppressed [ 638.847564] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 638.903312] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 638.918945] FAT-fs (loop4): Unrecognized mount option "dont_measure" or missing value [ 638.930109] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe0, 0x7fffefa5) 15:25:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ce, 0x0) 15:25:08 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = dup(0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000040)={0x28f9, 0x0, 0x301f, 0x4, 0x800, {0x10000, 0xe6b}}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x400, 0x70bd25, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x800) [ 639.154316] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:08 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="39000029054740957b9b821aa33b8381b9000000c8d420bdc534f2dada9a8cbeb75c7a10c8bbb66bf7a86f9239f9a4a3c4b5f89b10a31f26a9"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 15:25:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xff', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:08 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe1, 0x7fffefa5) 15:25:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000cf, 0x0) 15:25:08 executing program 4: lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4200, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) recvfrom(r0, &(0x7f0000000280)=""/4096, 0x1000, 0x40000000, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @remote}, 0x2, 0x3, 0x0, 0x3}}, 0x80) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000001280)={0x0, 0x0, [], @bt={0x48e7, 0x9, 0x1000, 0x8, 0x1, 0x7, 0x0, 0x9a364bbcf78a7158}}) 15:25:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe2, 0x7fffefa5) 15:25:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x4000000000000000}}, 0x152610) 15:25:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d0, 0x0) [ 639.531961] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 639.550012] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:08 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x6) 15:25:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe3, 0x7fffefa5) 15:25:08 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000009c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x4058534c, &(0x7f0000000800)={0x80, 0x0, 'client1\x00', 0x0, "3fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) 15:25:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d1, 0x0) [ 639.719898] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:08 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4800000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x4003ff) fallocate(r3, 0x1, 0x0, 0x800ffba) [ 639.769775] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d2, 0x0) 15:25:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe4, 0x7fffefa5) 15:25:08 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x81, 0x200000) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000380)={0xf, @win={{0x40, 0x6, 0x9, 0x6}, 0x0, 0x9, &(0x7f00000001c0)={{0x7c1, 0x1ff, 0x73a6fe1f, 0x401}, &(0x7f00000000c0)={{0xa1, 0x5, 0x3, 0x7}, &(0x7f0000000080)={{0x5, 0x100000001, 0x7fffffff, 0x4}}}}, 0x1000, &(0x7f0000000280)="e94dee2841b10c3736f978ea30b5c7faad23ce7c17ad8b31dd2687b89f61b90f172bcb1b8a3b6318a4cd359a6f326f7b312caadd2ec6b5be4426f9ae4cb67c221b2cee70093e9d0181fbcab29889af42354bdc44afada10d4e00371ba96ea375cee7cb53f38f522371d8b232b20d9ee472e686b208bf5046b3265d22b0139129fdda505ab11594bd00192512caa62a8aa814a8b8a9dedeca497bdfc05c3ef9d7c2d3070486b236ae79a8ffc8102102f280793268190397afff5ef47fd794b863a3e602b0078eeaa854b1db8f45dc6e020c0280a89ff4", 0x3}}) [ 639.903309] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d3, 0x0) [ 639.961347] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:08 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe5, 0x7fffefa5) 15:25:09 executing program 0: r0 = memfd_create(&(0x7f0000000480)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x13, r0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000340)=""/154, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8000080, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x1, 0x6, 0x0, &(0x7f0000000000)) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 15:25:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xff', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d4, 0x0) 15:25:09 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000080)={0x3, 0x5, 0x100000001, 0x400}) 15:25:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe6, 0x7fffefa5) 15:25:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d5, 0x0) 15:25:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe7, 0x7fffefa5) 15:25:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x84000, 0x0) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000080)=""/63, 0x3f, 0x0, 0x0, 0x0) 15:25:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xff', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d6, 0x0) 15:25:09 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6000000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:09 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x4000, 0x0) uselib(&(0x7f0000000040)='./file0\x00') 15:25:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe8, 0x7fffefa5) 15:25:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d7, 0x0) 15:25:09 executing program 0: clock_nanosleep(0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000001c0)) dup3(r0, r1, 0x0) 15:25:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) 15:25:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000140)) 15:25:09 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6800000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xff', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 640.669003] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:25:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d8, 0x0) 15:25:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xe9, 0x7fffefa5) [ 640.741078] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:25:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="fa0c000016008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1008ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff76470c7651d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c86010000000000000061dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073576a1f56d529e407154fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000003dc0)={0x0, 0x0, 0x0}, 0x0) 15:25:09 executing program 4: mkdir(&(0x7f00000000c0)='\x00', 0x1b1) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d9, 0x0) 15:25:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xea, 0x7fffefa5) 15:25:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xfc', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:09 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000da, 0x0) 15:25:10 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) 15:25:10 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004ac0)=[{{&(0x7f0000000040)=@isdn, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/189, 0xbd}, {&(0x7f0000000440)=""/224, 0xe0}, {&(0x7f0000000540)=""/177, 0xb1}, {&(0x7f0000000600)=""/192, 0xc0}], 0x5, &(0x7f00000000c0)=""/13, 0xd}, 0xfffffffffffffffa}, {{&(0x7f00000006c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000740)}, {&(0x7f0000000780)=""/24, 0x18}], 0x2, &(0x7f0000000800)=""/190, 0xbe}, 0x6}, {{&(0x7f00000008c0)=@ipx, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000940)=""/254, 0xfe}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/146, 0x92}], 0x3, &(0x7f0000000c00)=""/221, 0xdd}, 0x101}, {{&(0x7f0000000d00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d80)=""/142, 0x8e}, {&(0x7f0000000e40)=""/39, 0x27}], 0x2, &(0x7f0000000ec0)=""/163, 0xa3}, 0x400}, {{&(0x7f0000000f80)=@l2, 0x80, &(0x7f0000002300)=[{&(0x7f0000001000)=""/243, 0xf3}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/228, 0xe4}, {&(0x7f0000002200)=""/234, 0xea}], 0x4, &(0x7f0000002340)=""/27, 0x1b}, 0x80}, {{&(0x7f0000002380)=@rc, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002400)=""/16, 0x10}, {&(0x7f0000002440)=""/166, 0xa6}, {&(0x7f0000002500)=""/232, 0xe8}, {&(0x7f0000002600)=""/111, 0x6f}, {&(0x7f0000002680)=""/127, 0x7f}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/52, 0x34}, {&(0x7f0000002840)=""/122, 0x7a}], 0x8, &(0x7f0000002940)=""/47, 0x2f}, 0x3}, {{&(0x7f0000002980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002a00)=""/113, 0x71}], 0x1, &(0x7f0000002ac0)=""/209, 0xd1}, 0x7f}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000002bc0)=""/115, 0x73}, {&(0x7f0000002c40)=""/124, 0x7c}, {&(0x7f0000002cc0)=""/38, 0x26}, {&(0x7f0000002d00)=""/96, 0x60}, {&(0x7f0000002d80)=""/74, 0x4a}], 0x5, &(0x7f0000002e80)=""/49, 0x31}, 0xff}, {{&(0x7f0000002ec0)=@alg, 0x80, &(0x7f0000003280)=[{&(0x7f0000002f40)=""/133, 0x85}, {&(0x7f0000003000)=""/160, 0xa0}, {&(0x7f00000030c0)=""/98, 0x62}, {&(0x7f0000003140)=""/113, 0x71}, {&(0x7f00000031c0)=""/141, 0x8d}], 0x5, &(0x7f0000003300)=""/223, 0xdf}, 0x1}, {{&(0x7f0000003400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003480)=""/131, 0x83}, {&(0x7f0000003540)=""/227, 0xe3}, {&(0x7f0000003640)=""/250, 0xfa}, {&(0x7f0000003740)=""/18, 0x12}, {&(0x7f0000003780)=""/25, 0x19}, {&(0x7f00000037c0)=""/233, 0xe9}, {&(0x7f00000038c0)=""/38, 0x26}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/143, 0x8f}], 0x9, &(0x7f0000004a80)=""/26, 0x1a}, 0xb516}], 0xa, 0x102, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000004d40)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x4}}}, &(0x7f0000004e00)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000004e40)={r1, 0x5, 0x2}, &(0x7f0000004e80)=0x8) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xeb, 0x7fffefa5) 15:25:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000db, 0x0) 15:25:10 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0) 15:25:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xfd', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:10 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7400000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xec, 0x7fffefa5) 15:25:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000dc, 0x0) 15:25:10 executing program 4: r0 = getpgid(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000040)) r1 = geteuid() lstat(&(0x7f00000001c0)='./file0/../file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x480, 0x0) connect$bt_sco(r3, &(0x7f0000000a80)={0x1f, {0x1, 0x7, 0x3, 0x1ff, 0x0, 0x9}}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @local}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) getgroups(0x4, &(0x7f00000006c0)=[0x0, 0x0, 0xee00, 0xffffffffffffffff]) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) stat(&(0x7f0000000840)='./file0/../file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000900), &(0x7f0000000940)=0x0, &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000010002000000000002000000", @ANYRES32=r1, @ANYBLOB="02000700", @ANYRES32=r2, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=r5, @ANYBLOB="040007000000000008000200", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=r7, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32=r9, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r10, @ANYBLOB="08000400", @ANYRES32=r11, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="10000600000000002000010000000000"], 0x7c, 0x3) fcntl$dupfd(r3, 0x406, r3) mkdir(&(0x7f0000000a40)='./file0/../file0/file0\x00', 0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000b40)=ANY=[@ANYBLOB="62726f7574650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000", @ANYPTR=&(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000100000000000000000000c9bcde711c83191a11000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8) 15:25:10 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 15:25:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x8c', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xed, 0x7fffefa5) 15:25:10 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000dd, 0x0) 15:25:10 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000001c0)={0x3, 0x59, 0x20, 0x6}, 0x6) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(r1, &(0x7f0000000040)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 15:25:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000de, 0x0) 15:25:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xee, 0x7fffefa5) 15:25:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf5', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000df, 0x0) 15:25:10 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x100020, 0x0) 15:25:10 executing program 0: r0 = syz_open_dev$dspn(0x0, 0x57, 0xa00) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r5, 0x3) getpgid(0x0) accept4(r5, 0x0, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f00000002c0), 0x4) pread64(r3, &(0x7f0000000080)=""/28, 0x1c, 0x0) 15:25:10 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syncfs(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x4000, 0x0) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000340)={'trans=unix,', {[{@access_client='access=client'}, {@afid={'afid', 0x3d, 0xcf}}, {@afid={'afid', 0x3d, 0x476}}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fsname={'fsname'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, 'keyring{!md5summd5sum.posix_acl_accesswlan0posix_acl_accessuseruser}]\x06vboxnet1trusted'}}, {@appraise='appraise'}]}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e23, @loopback}], 0x20) 15:25:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xef, 0x7fffefa5) 15:25:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e0, 0x0) 15:25:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf6', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e1, 0x0) 15:25:11 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x100020, 0x0) 15:25:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf0, 0x7fffefa5) [ 642.042581] 9pnet: p9_fd_create_unix (19752): problem connecting socket: ./file0: -111 [ 642.077364] 9pnet: p9_fd_create_unix (19742): problem connecting socket: ./file0: -111 15:25:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3, 0xa02) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) prctl$PR_SET_TSC(0x1a, 0x3) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2900021, 0x0) 15:25:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e2, 0x0) 15:25:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf1, 0x7fffefa5) 15:25:11 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xc000000000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:11 executing program 0: r0 = syz_open_dev$dspn(0x0, 0x57, 0xa00) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r5, 0x3) getpgid(0x0) accept4(r5, 0x0, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f00000002c0), 0x4) pread64(r3, &(0x7f0000000080)=""/28, 0x1c, 0x0) 15:25:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e3, 0x0) 15:25:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xfe', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf2, 0x7fffefa5) 15:25:11 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000007c0)="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") socket$bt_bnep(0x1f, 0x3, 0x4) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x101040, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000380)={0x1, 0x1000, 0x100000000, 'queue1\x00'}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000000c0)=@netrom) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in=@empty, @in6=@local}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:11 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x100020, 0x0) 15:25:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e4, 0x0) 15:25:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf3, 0x7fffefa5) [ 642.854311] Unknown ioctl 35301 15:25:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e5, 0x0) 15:25:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf4, 0x7fffefa5) 15:25:12 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x100020, 0x0) [ 643.053591] Unknown ioctl 35301 15:25:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:12 executing program 0: gettid() timer_create(0x0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000880)) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000440)={0x10000, 0x2, 0x7, 0x9}) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha256-avx2)\x00'}, 0x58) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000280)={0x3, @pix={0x7, 0x10001, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x1, 0x0, 0x3}}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffe81) syz_genetlink_get_family_id$fou(0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x9}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000200), 0x8) 15:25:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e6, 0x0) 15:25:12 executing program 4: io_setup(0xd49a, &(0x7f0000000040)=0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) r2 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xd5, 0x8000) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0xdb, r1, &(0x7f00000000c0)="09d1345a02d203dfecad67d59145eeb2253bc98e1b6d", 0x16, 0x9, 0x0, 0x1, r2}]) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000001640)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r3, 0xc0104320, &(0x7f0000000100)={0x1, 0x0}) lsetxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='!\x00', 0x2, 0x2) mount$bpf(0x20000000, &(0x7f0000001680)='./file0/../file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) getsockopt$nfc_llcp(r2, 0x118, 0x0, &(0x7f0000000580)=""/4096, 0x1000) write$binfmt_script(r2, &(0x7f0000001580)={'#! ', './file0/../file0', [{0x20, '/dev/dsp#\x00'}, {0x20, '&J^cgroup\'/'}], 0xa, "7c97acd29e37326135245a29596ecf5b04cfabae4c91ba4f8832b8183e04c9fcbe7c371271a09058768c99776f9dc710a8384e69bec401e4c74e022cde07f69c5c6cf2bd69c345d242e5ffb9396d81c726946209407fb542f80f17612740bda1b004b5d58b47"}, 0x91) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="000d0000338e1fc45e3b135a00"], &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x3, 0x4, 0x8, 0xfffffffffffffff7, 0x5}, &(0x7f0000000440)=0x14) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000480)={r4, 0x200003, 0x7, 0x3, 0x101, 0x1, 0x7, 0x12, {r5, @in6={{0xa, 0x4e20, 0x7, @loopback, 0x2}}, 0xfffffffc, 0x7f, 0x1, 0x200, 0x10000000001}}, &(0x7f0000000240)=0xb0) 15:25:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf5, 0x7fffefa5) 15:25:12 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100020, 0x0) 15:25:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e7, 0x0) 15:25:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf6, 0x7fffefa5) [ 643.856721] EXT4-fs: 36 callbacks suppressed [ 643.856736] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 643.886362] kcapi: manufacturer command 1 unknown. [ 643.910227] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e8, 0x0) 15:25:13 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x100020, 0x0) 15:25:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf7, 0x7fffefa5) [ 644.067855] kcapi: manufacturer command 1 unknown. 15:25:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 644.212564] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 644.244999] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 644.348846] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000940)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0x1, 0x61}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x20000, 0x0) 15:25:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e9, 0x0) 15:25:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf8, 0x7fffefa5) 15:25:13 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001300)='/dev/cachefiles\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000003780)={&(0x7f0000001340)=@nl=@unspec, 0x80, &(0x7f0000003640)=[{&(0x7f00000013c0)="8a7e18afd325f449258ca5fd9eafaf8aee8dbe1088d62ed0d7e88a767575e2ba25cc2ded0353871eb0ff999498d4d4f996457a399c912b046c665bb409413c72ddbecbc699216772f2f5b7", 0x4b}, {&(0x7f0000001440)="df74e4b76e800ce9f11bff64f23daad3d26d525e06e2f59028a94d2dc67f1a5274d0190da350d818beef093d433020bcc3a4f38f7924049da7d2be8135ed90b397630aa42f0d5656efaa974fa6a6b53c7cbeed396b30d28d8135c667fc9dc67785", 0x61}, {&(0x7f00000014c0)="a16a08d7bce959a14f74791e4f63f137539c008a", 0x14}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)="765ee3fb204652790aadbf56e4c73f3c0068d2ed3069bda08e5f7d9875ca7514febdeadea933865b42e80018316aa6ee4771821694e704904b8bdd424ecdc3adfb8ea4106eaa5c4340692a6adfa8230476b21eb021683149662845c690a23cd60cd09e1f80995a6a29afa7602854bd5abced", 0x72}, {&(0x7f0000002580)="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", 0x1000}, {&(0x7f0000003580)="fd93116b5089897be1c3a3a322c609ffe743f62568772ab97480a3f3e02e91cc237771aeff971825136d8895d17d755e1db85e046b93017d5da83f706ec3255b1b38ec8f635b03a608aa69f1c047cf93d12999bc4f919badd4cba50dbb22269f89bdcb1a9b8bdfc2bc2906febd07d34d0f0e3da90be0dfbdcaeb7c6172cda948d0d5f412a4726b23f2a300402e0c91ea911bfdd075fd87132336", 0x9a}], 0x7, &(0x7f00000036c0)=[{0xa8, 0x19e, 0x5, "196ccb9c400e3fb05193f92b34b19f3fcb3b96fefbb6ac11eb9fe5b5e9c95abd8c5be6ea6d06ef32337d947224b9f6539df8a1497deb766f409450f343f3626947b846c2c434bcb28c04a2c56eb709cccf7648d5ea84efebce20c4a15dc8acc6c375f24763f517e139f8cfad1a6efb907a331f130d16122f0dcba7746aed928d7e879775b10d2647fdf09a1dd85502941075dc794e"}], 0xa8}, 0x40000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x8a141, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0x1000}], 0x1}, 0x20000000) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000012c0)={0x0, 0x81}, 0xc) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) syz_open_dev$adsp(&(0x7f0000001280)='/dev/adsp#\x00', 0xd, 0x1e33e09c8df0b596) 15:25:13 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x100020, 0x0) 15:25:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xf9, 0x7fffefa5) [ 644.652752] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 644.679960] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ea, 0x0) 15:25:13 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 644.702209] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:13 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x100020, 0x0) [ 644.812343] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:13 executing program 0: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r0, r2, &(0x7f0000000200)=0xf2, 0x20000000009c) 15:25:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xfa, 0x7fffefa5) 15:25:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000eb, 0x0) [ 644.855977] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:13 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) open(&(0x7f00000000c0)='./file0/../file0\x00', 0x80, 0x142) 15:25:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f00000001c0)=@nl=@unspec={0x0, 0x800000000000000}, 0x45, &(0x7f0000000240), 0x36a, &(0x7f0000000680)}, 0x0) 15:25:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ec, 0x0) 15:25:14 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x100020, 0x0) 15:25:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xfb, 0x7fffefa5) 15:25:14 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x101400, 0x0) r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0xffffffff) read(r0, &(0x7f00000000c0)=""/130, 0x82) 15:25:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ed, 0x0) 15:25:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xfc, 0x7fffefa5) 15:25:14 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x100020, 0x0) 15:25:14 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2a202, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1, 0x12) 15:25:14 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ee, 0x0) 15:25:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xfd, 0x7fffefa5) 15:25:14 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x100020, 0x0) 15:25:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ef, 0x0) 15:25:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0xfe, 0x7fffefa5) 15:25:14 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x80000) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x4e21, @empty}}) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f0, 0x0) 15:25:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3def3ae6f27feb5bdb5c0d86067c377412386e29419d797a1f86e16bb70fd1266106a5919f08e985fd222cc9ea03066d7f5d8bba83cce049dba31e5938cb50fc", "75fd13ac02c5c82c644072ecb894df0497c3d4e7387aa8423c61d3da671fd814"}) 15:25:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x102, 0x7fffefa5) 15:25:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x100020, 0x0) 15:25:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:15 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0xf73, 0x20, 0x60ce, 0x86, 0x80000000, 0x3}) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x100020, 0x0) 15:25:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f1, 0x0) 15:25:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x4, 0x0) 15:25:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x103, 0x7fffefa5) 15:25:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 15:25:15 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x40000, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f2, 0x0) 15:25:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x100020, 0x0) 15:25:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x104, 0x7fffefa5) 15:25:15 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0xffffff3b, 0xfffffffffffffffe) r0 = socket$key(0xf, 0x3, 0x2) dup(r0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f3, 0x0) 15:25:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x5, 0x0, 0x100020, 0x0) 15:25:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f4, 0x0) 15:25:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6, 0x0, 0x100020, 0x0) 15:25:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 15:25:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x105, 0x7fffefa5) 15:25:15 executing program 4: mkdir(&(0x7f0000000800)='./file0\x00', 0x108) r0 = semget(0x0, 0x1, 0x26) semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f00000006c0)=""/193) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r1 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000, 0x3, &(0x7f0000000480)=[{&(0x7f00000001c0)="dd0c70273630819d6e4465f6b5925a5bf787e226ab59b60c7b6a8cd2943834ddec45f2aae0cadcf79270256b68be6fe92ed50e48a4aba3d96da745611de5d77ea7676390c80039", 0x47, 0x3ff}, {&(0x7f0000000280)="5e986534968fa1b730cb3a87ae02f525aa146356ad30343991a76fcba711a2f244acead33249480404c3403d56e709cf943d3bce8e656e15593621210798ea562bda179491149e0caf941e07af8e14f832222634044007143acc152bb13e429428b3fd177ce7c66f27466225c1d10f022b6c7507a8da5dfb51c67a2f28dccd8b237c1d8fe7f68bb47d185eebb10d50b30abbe07eada9ef8bf140743ea7a9f796ecf8bb218999914ead8bd3f249f719ef421cddfea65dbb2d20571819133b08456b9602c4c42ed1ca1b59bad5364ae34e9feae94b6e63", 0xd6, 0x400}, {&(0x7f0000000380)="fa4ca44ebf795713b2e1165f113a88831046f781d40b199eeb3c63be279a15b584991663f40afc1f4c49d6890981c319ff404b2bf3b31d2616693ef282849f9c12fe0016f766220cad8863050261adb17c452d3941a2c94b544cd2cfbac34c06f551606297e4041be60889386d4465ccca47dfcdb3551bb49e23c0d172fd3d2002471b47c097c05b4f664d1521620f81712153a6d5f1bdc62d952cb0bacb3562a6345092e9b67664014b4a3456cbed6cfbcdec682472d17f8049c7fcd2641d61b01d15b822c8ba106d910db308755af2edc917f841752b178fe0", 0xda, 0x4}], 0x10, &(0x7f0000000600)={[{@fat=@usefree='usefree'}, {@shortname_win95='shortname=win95'}], [{@audit='audit'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_type={'subj_type', 0x3d, 'ext4\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x39, 0x35, 0x0, 0x3d, 0x0, 0x3d, 0x65], 0x2d, [0x7b, 0x39, 0x66, 0x66], 0x2d, [0x73, 0x37, 0x63, 0x31], 0x2d, [0x33, 0x64, 0x74, 0x35], 0x2d, [0x72, 0x63, 0x0, 0x75, 0x64, 0x65, 0x62, 0x64]}}}, {@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}]}) 15:25:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f5, 0x0) 15:25:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x100020, 0x0) 15:25:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f6, 0x0) 15:25:16 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x106, 0x7fffefa5) 15:25:16 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xf9a, 0x200802) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000200)={@remote, 0x0}, &(0x7f0000000280)=0x14) bind$can_raw(r0, &(0x7f00000002c0)={0x1d, r1}, 0x10) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) recvfrom(r0, &(0x7f0000000300)=""/237, 0xed, 0x102, &(0x7f0000000080)=@l2={0x1f, 0xcc, {0x0, 0x79db, 0x80000000, 0x7, 0x2, 0x1}, 0x100, 0x11}, 0x80) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x100020, 0x0) 15:25:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f7, 0x0) 15:25:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x107, 0x7fffefa5) 15:25:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 15:25:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x100020, 0x0) 15:25:16 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0xc0000) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000280)={[0xffffffffffffff59, 0x8, 0x10001, 0xc771, 0x0, 0x100000001, 0x30a12b84, 0x401, 0x5, 0x7, 0x4, 0x4, 0x5, 0xff, 0x40, 0x7f], 0x5000}) 15:25:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f8, 0x0) 15:25:16 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x108, 0x7fffefa5) 15:25:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x100020, 0x0) 15:25:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f9, 0x0) 15:25:16 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0xfffffffffffffd65, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) mknod(&(0x7f00000001c0)='./file0/../file0\x00', 0xa0, 0x9) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0x4c8ca3a4, "edaf01efe6dacdea827a5db01a04e17dbd1f359950c89b74c828106d469b2031", 0x20, 0x0, 0x81, 0x0, 0xfffffffffffffffd}) fanotify_init(0x9, 0x801) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000000)=0x2366a6b7e3c86954, 0x4) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x20000000, 0x0, 0x0, 0x7ffe, 0x0) 15:25:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2d, 0x0, 0x100020, 0x0) 15:25:17 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fa, 0x0) 15:25:17 executing program 0: 15:25:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000702000)) timer_create(0x800000000000008, 0x0, &(0x7f00000000c0)) 15:25:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x109, 0x7fffefa5) 15:25:17 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x48, 0x0, 0x100020, 0x0) 15:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fb, 0x0) 15:25:17 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000702000)) timer_create(0x800000000000008, 0x0, &(0x7f00000000c0)) 15:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fc, 0x0) 15:25:17 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c, 0x0, 0x100020, 0x0) 15:25:17 executing program 0: 15:25:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x10a, 0x7fffefa5) 15:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fd, 0x0) 15:25:17 executing program 4: 15:25:17 executing program 0: 15:25:17 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x60, 0x0, 0x100020, 0x0) 15:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fe, 0x0) 15:25:17 executing program 4: 15:25:17 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x10b, 0x7fffefa5) 15:25:17 executing program 0: 15:25:17 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x68, 0x0, 0x100020, 0x0) 15:25:17 executing program 4: 15:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000102, 0x0) 15:25:17 executing program 0: [ 648.905845] EXT4-fs: 30 callbacks suppressed [ 648.905861] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:17 executing program 4: 15:25:17 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c, 0x0, 0x100020, 0x0) 15:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000103, 0x0) 15:25:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x10c, 0x7fffefa5) [ 649.014249] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:18 executing program 0: 15:25:18 executing program 4: 15:25:18 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000104, 0x0) 15:25:18 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x74, 0x0, 0x100020, 0x0) 15:25:18 executing program 0: 15:25:18 executing program 4: 15:25:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x10d, 0x7fffefa5) 15:25:18 executing program 4: 15:25:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000105, 0x0) 15:25:18 executing program 0: 15:25:18 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7a, 0x0, 0x100020, 0x0) [ 649.500333] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:18 executing program 4: 15:25:18 executing program 0: [ 649.635752] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000106, 0x0) 15:25:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x10e, 0x7fffefa5) 15:25:18 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:18 executing program 4: 15:25:18 executing program 0: 15:25:18 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc0, 0x0, 0x100020, 0x0) 15:25:18 executing program 0: 15:25:18 executing program 4: 15:25:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000107, 0x0) [ 649.833044] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:18 executing program 0: 15:25:18 executing program 4: 15:25:18 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x100020, 0x0) 15:25:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x10f, 0x7fffefa5) [ 649.920858] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:18 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000108, 0x0) 15:25:19 executing program 4: 15:25:19 executing program 0: 15:25:19 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x500, 0x0, 0x100020, 0x0) 15:25:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000109, 0x0) 15:25:19 executing program 0: [ 650.116383] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:19 executing program 4: 15:25:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x110, 0x7fffefa5) 15:25:19 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x600, 0x0, 0x100020, 0x0) [ 650.190638] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010a, 0x0) 15:25:19 executing program 0: 15:25:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:19 executing program 4: 15:25:19 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x100020, 0x0) 15:25:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010b, 0x0) 15:25:19 executing program 0: 15:25:19 executing program 4: [ 650.397024] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x111, 0x7fffefa5) 15:25:19 executing program 4: [ 650.482331] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010c, 0x0) 15:25:19 executing program 0: 15:25:19 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x100020, 0x0) 15:25:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:19 executing program 0: 15:25:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010d, 0x0) 15:25:19 executing program 4: 15:25:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x112, 0x7fffefa5) 15:25:19 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf1a, 0x0, 0x100020, 0x0) 15:25:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010e, 0x0) 15:25:19 executing program 0: 15:25:19 executing program 4: 15:25:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:19 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1a0f, 0x0, 0x100020, 0x0) 15:25:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010f, 0x0) 15:25:19 executing program 0: 15:25:19 executing program 4: 15:25:19 executing program 0: 15:25:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000110, 0x0) 15:25:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x113, 0x7fffefa5) 15:25:20 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1f00, 0x0, 0x100020, 0x0) 15:25:20 executing program 4: 15:25:20 executing program 0: 15:25:20 executing program 4: 15:25:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:20 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2000, 0x0, 0x100020, 0x0) 15:25:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000111, 0x0) 15:25:20 executing program 0: 15:25:20 executing program 4: 15:25:20 executing program 0: 15:25:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x114, 0x7fffefa5) 15:25:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000112, 0x0) 15:25:20 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2d00, 0x0, 0x100020, 0x0) 15:25:20 executing program 4: 15:25:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:20 executing program 0: 15:25:20 executing program 4: 15:25:20 executing program 0: 15:25:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000113, 0x0) 15:25:20 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3f00, 0x0, 0x100020, 0x0) 15:25:20 executing program 4: 15:25:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x115, 0x7fffefa5) 15:25:20 executing program 0: 15:25:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000114, 0x0) 15:25:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:20 executing program 4: 15:25:20 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x100020, 0x0) 15:25:20 executing program 0: 15:25:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000115, 0x0) 15:25:20 executing program 4: 15:25:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x116, 0x7fffefa5) 15:25:20 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4800, 0x0, 0x100020, 0x0) 15:25:20 executing program 0: 15:25:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000116, 0x0) 15:25:21 executing program 0: 15:25:21 executing program 4: 15:25:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x117, 0x7fffefa5) 15:25:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c00, 0x0, 0x100020, 0x0) 15:25:21 executing program 4: 15:25:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000117, 0x0) 15:25:21 executing program 0: 15:25:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6000, 0x0, 0x100020, 0x0) 15:25:21 executing program 4: 15:25:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x118, 0x7fffefa5) 15:25:21 executing program 0: 15:25:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000118, 0x0) 15:25:21 executing program 4: 15:25:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6800, 0x0, 0x100020, 0x0) 15:25:21 executing program 4: 15:25:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="b93c564b63ff2d3822e13030e967000000", 0x11) 15:25:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000119, 0x0) 15:25:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c00, 0x0, 0x100020, 0x0) 15:25:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x119, 0x7fffefa5) 15:25:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r1}, 0x21) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), 0x0}, 0x20) 15:25:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=@mpls_getnetconf={0x14, 0x67, 0xd11}, 0x14}}, 0x0) 15:25:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7400, 0x0, 0x100020, 0x0) 15:25:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x80) fallocate(r0, 0x0, 0x0, 0x10001) 15:25:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011a, 0x0) 15:25:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000200)='/dev/loop0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 15:25:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x11a, 0x7fffefa5) 15:25:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011b, 0x0) 15:25:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7a00, 0x0, 0x100020, 0x0) 15:25:21 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc000, 0x0, 0x100020, 0x0) 15:25:22 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011c, 0x0) 15:25:22 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x11b, 0x7fffefa5) 15:25:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x40000, 0x0, 0x100020, 0x0) 15:25:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011d, 0x0) 15:25:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x11c, 0x7fffefa5) 15:25:22 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x100020, 0x0) 15:25:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011e, 0x0) 15:25:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011f, 0x0) 15:25:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x100000, 0x0, 0x100020, 0x0) 15:25:22 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x11d, 0x7fffefa5) 15:25:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3ff7f8, 0x0, 0x100020, 0x0) 15:25:22 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 653.945745] EXT4-fs: 23 callbacks suppressed [ 653.945784] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3ff800, 0x0, 0x100020, 0x0) 15:25:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000121, 0x0) 15:25:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x11e, 0x7fffefa5) 15:25:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 654.094783] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf83f00, 0x0, 0x100020, 0x0) 15:25:23 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000122, 0x0) [ 654.276552] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x100020, 0x0) 15:25:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x11f, 0x7fffefa5) 15:25:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 654.369278] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 654.405865] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000123, 0x0) 15:25:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x100020, 0x0) 15:25:23 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000124, 0x0) 15:25:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x120, 0x7fffefa5) 15:25:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x100020, 0x0) [ 654.657885] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000125, 0x0) 15:25:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x100020, 0x0) [ 654.787634] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:23 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x121, 0x7fffefa5) 15:25:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x5000000, 0x0, 0x100020, 0x0) [ 654.929395] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 654.959304] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000126, 0x0) 15:25:24 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x122, 0x7fffefa5) 15:25:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6000000, 0x0, 0x100020, 0x0) 15:25:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000127, 0x0) [ 655.184852] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x100020, 0x0) 15:25:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x123, 0x7fffefa5) 15:25:24 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000128, 0x0) 15:25:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xa000000, 0x0, 0x100020, 0x0) 15:25:24 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x124, 0x7fffefa5) 15:25:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000129, 0x0) 15:25:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x10000000, 0x0, 0x100020, 0x0) 15:25:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000012a, 0x0) 15:25:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x125, 0x7fffefa5) 15:25:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000012b, 0x0) 15:25:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1a0f0000, 0x0, 0x100020, 0x0) 15:25:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000012c, 0x0) 15:25:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x126, 0x7fffefa5) 15:25:25 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000012d, 0x0) 15:25:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1f000000, 0x0, 0x100020, 0x0) 15:25:25 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf6', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000012e, 0x0) 15:25:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x20000000, 0x0, 0x100020, 0x0) 15:25:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x127, 0x7fffefa5) 15:25:25 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000012f, 0x0) 15:25:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2d000000, 0x0, 0x100020, 0x0) 15:25:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x128, 0x7fffefa5) 15:25:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf6', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000130, 0x0) 15:25:25 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xff', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3f000000, 0x0, 0x100020, 0x0) 15:25:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xf6', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000131, 0x0) 15:25:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x129, 0x7fffefa5) 15:25:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x40000000, 0x0, 0x100020, 0x0) 15:25:25 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\xff', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000132, 0x0) 15:25:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x48000000, 0x0, 0x100020, 0x0) 15:25:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12a, 0x7fffefa5) 15:25:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000133, 0x0) 15:25:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c000000, 0x0, 0x100020, 0x0) 15:25:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000134, 0x0) 15:25:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x60000000, 0x0, 0x100020, 0x0) 15:25:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12b, 0x7fffefa5) 15:25:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000135, 0x0) 15:25:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x68000000, 0x0, 0x100020, 0x0) 15:25:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000136, 0x0) 15:25:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c000000, 0x0, 0x100020, 0x0) 15:25:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12c, 0x7fffefa5) 15:25:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000137, 0x0) 15:25:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x74000000, 0x0, 0x100020, 0x0) 15:25:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x5, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000138, 0x0) 15:25:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12d, 0x7fffefa5) 15:25:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7a000000, 0x0, 0x100020, 0x0) 15:25:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000139, 0x0) 15:25:27 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, 0x0) 15:25:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12e, 0x7fffefa5) 15:25:27 executing program 4: r0 = syz_open_dev$media(&(0x7f0000001100)='/dev/media#\x00', 0x9, 0x8241) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000002f40)={0x0, 0x6, 0x8, 0x9, 0x81, 0x7, 0x9, 0x6, {0x0, @in6={{0xa, 0x4e22, 0x1f, @mcast1, 0x800}}, 0x4, 0x7, 0xfffffffffffffffd, 0x800, 0xad3c}}, &(0x7f0000003000)=0xb0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000003040)={0x0, 0x76, "bf3cfc31f4f1ca3274a4a2b6212b6fd03f54d7954829d11bdd30d041d78d45cfaa0af3e0d2c5ab28a04ef5d738b35f97d3fff541cd68904871b6ef0dbc974cf07d3205febb2ffcd3f539e18cfba559b02549a1a61400bdd06c90d138665245f1a82f5f6820ce2b986fc74990149112d01a646eff9eaf"}, &(0x7f00000030c0)=0x7e) sendmmsg$inet_sctp(r0, &(0x7f00000031c0)=[{&(0x7f0000001140)=@in6={0xa, 0x4e20, 0x4, @loopback, 0x1}, 0x1c, &(0x7f0000001700)=[{&(0x7f0000001180)="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", 0xfa}, {&(0x7f0000001280)="9404ba3421d66d9265687db5773f65a78801ace0548941c2304d0fe5d0ac91adbfeac555eae69d3af10760088ba4b8286ce30a383ac3356997827ff28fdf08f1ccb827eb0bb90bc12c1c755acdaa0647f0ee81e4ecb887dabbadd558af1e8d4906a16793df060da1c8c402e4ac0f92f892ffc0fcbc8a7f4f23b7c9c5d19eea3532dfd787c5f2ac8010ddb7a4", 0x8c}, {&(0x7f0000001340)="8f4fe0181eef363d996a38187f5cea06f096a6feb61ad9e076e703", 0x1b}, {&(0x7f0000001380)="6e88c8f8e1ee7d4cf2a539faa24282fe95baf44085289f7aafd9106e97ee1f4083cc589b87267676ea19a5b8a2f644d6c684345168562b5adb8a20f922018ee00f16588fbf2a187c7d7679a3f658ead4a36c064872a3", 0x56}, {&(0x7f0000001400)="ca00a1b4b55eaf26760bd2fc7bfdd5d955497848a009bd520b4e79a161e447a4498f10c15532f4c55a0857d5f57763e58713c83722f42846feace2c7eadfc7da8689268f01d174b068786591004db8e29fe8c73efbdeaa87820604eb683e3b2c6d76398679a06ca0be43750cc2b3bc51cf04938ab4866be6124596433b96e15f0cf19bb47443ea0cdec7a38c0360fb18e3ce0d142a9a89aaedf82489ee92cbfef963ee6b5a6726c4252d45645bf3bce37f7b24b99da5d1f0258fd6285e646634558637088a2c2135", 0xc8}, {&(0x7f0000001500)="00f86b546aa9c63980db2a256147a9cec7cfe2f826f19d76bd67030d779f9adaaf9ebed15e0bc385c0260528524a2887e2d51940dd5ca2583e9d1cd5036aab2a88b5fdc67a4fb081be9c6aa2467c01faca4cddbd6889a3a1d5b97a5d4697e5727017a1e8cc040f3e297f002d1bb8810350e8d8a3dcc5aad04ad58b52e96be7ae38e382e2a92413323bcd89261b3cfc7d1fc622242674055045f3731d102e0a08b1ccbcc77dee9ec4", 0xa8}, {&(0x7f00000015c0)="4dfd4d7e2d3b62ac995a8cc00bf393402b240f7e29a07c755a17c9a3731aa70422f2fdab80cb780e1907d90feb826ef8448ff1dee6a66dda4a52d9b410c4c30986b40d2bceadf73afaca", 0x4a}, {&(0x7f0000001640)="279d4ab563e8b78f97241beee583793d00ce5bca0c6bfde58088bd5e00ebb9a3f125cb0c40f19789e6e5be1935c05cd58e3dc3ed14673541d966b897b1d4f2", 0x3f}, {&(0x7f0000001680)="7d73b01a420a765f220ce51756449ac19bb18ff7aa30", 0x16}, {&(0x7f00000016c0)="ada08abe4770dedded6e9f17892040c3c7d70d424598199040e17ae84dc99c717c72ecfd3140b76010437447402e6864", 0x30}], 0xa, 0x0, 0x0, 0x20000000}, {&(0x7f00000017c0)=@in6={0xa, 0x4e21, 0x2a, @local, 0x7}, 0x1c, &(0x7f0000001840)=[{&(0x7f0000001800)="9bfb7a70ed4df14eb1c5295ea8ac69961360110cfe601a7b610fa706", 0x1c}], 0x1, &(0x7f0000001880)=[@dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @init={0x18, 0x84, 0x0, {0x7fff, 0x5, 0x6b, 0x2}}, @authinfo={0x18, 0x84, 0x6, {0x3}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x4}}], 0x60, 0x40}, {&(0x7f0000001900)=@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000002e80)=[{&(0x7f0000001940)="379160b48cc9ce18d2f4ae0930c7a87efbcb2d067bfad71e2eb243b967a9d40e8ae8e083d641cff8cdce8bae75f93915207879b0bd1298afc72ff563871241ac9a9ccc239c172df9ab6488e76d9840f16b69dac556616c4e5fcec6e3d17c95a0ab29be7c9b5666c43e239a033e35186edf580339e9b97483ffac9b2607df7c5597eb87", 0x83}, {&(0x7f0000001a00)="3672bd5845e0b25b6cfc291647a842b2bcaea83e450aad996a193c0e4f26289a5c2b8464523cc32b9f21d945d5da03841d12c2076babf75d0fd019c40b7edf65204a27df1aa87dc72909f53cfb56a158cc3e9fcdba3ba4f2117f2a299662ed75f3d32b00fe1236f187e88203a43d5865be40e5425a7e29afd29ea8960bac26f5578d5ba7d4b12c", 0x87}, {&(0x7f0000001ac0)="be9a3dfa0e1989da0c6535d92e4046d11e7741871d449e4b38d5b765ac655455d903f7fa8a", 0x25}, {&(0x7f0000001b00)="7a3bc7cf3e67d820bc8e52c40396c6a9738b397b18953e105a92d7c7ed215f6d2049ae3d4a5550cf889084c8abd9dba94e2d2a91ef3d7a7b2133e61c7c860f0ab563eea74430cca255c4171c6eaa154a113c70893a6e14bd2efea41e20a57afd54d3d5b991cd9e76728938548e5a08004869daf69aa5449b6d633ffcc6b359a49c624140ab634328421a089db111c763aadc97ab8d71455d9ab53588f0cc62528adf402becf10f69375ea15170f7c16d67d477eafa94a66ad08ad7", 0xbb}, {&(0x7f0000001bc0)="3bbbbbc57daeaf5e0180e19e9f9fb7c8530b3134f320a887587e083fa96cbd32f3b7a7d709e459339c1747725fd01c7c6e8109f521bc03ff318ce59fbb9167be34d1c124f06cf017c891d7f234e8b37a509fa3db544797d45ea26fa038597dcca90134d8bbe3c0101876a2ba466490bc3a3161ce53df04f2d44b9ab596ffc383f8095c91e7923bc34b056402b7bd5e4c7eddd9401164a17d46ed1acf75d42e075add7a07a0f89b7c1baf59fb2140364d9e2661dcbb4252d1be09df4d4e8eb5faa867cf0f4cab732f46f0c42bdfdb522c7798c837658075c3d122814553f2562694c61046039e8b09c7dd4921230610273e20aacfbff38758ee39807f07e3042ca669abacdf248364aee3791fb0ff7c6bc3bf200d0141d94f7fdbc6b779a324d5da16139de0ea7eb758714213bd89d1de7d1b97c27f87ac823c915343c90128e8ba0d4ec431c6af147e5cb67c01a9075b9160d2c037275d77004b957b308c4e71ba36e1fe5a7df6697307387a4c5e4ed45a05a9088ae8da8335d610e0b5557d1a97479796a8821f4bc4f3c2db3db44461cf31de13f793f7901925085cfc416daf07f918a01050cb799d027c6d93796bf4b0ce68b383b98dda8d754130c20e6295babe6f10190598a2a0479a6415fa6891a4f695f9a13ce9eeab6723ab485c6162372cfbb6deaab1426627e79861c29d6c70a60381cf3e0da0c7f5dced3f44ab8a2492f4808950c025cf60c2b8d4953d0c2deed386a379cac8001b47b81b76b2d60f5f22624dada41d77c2f5ce542ab4eb3984f2aa496e5cc315f227789bae55343007fbd8ee6c78bbeb74f0f49539f9ea5521e2c6ae2b5a567f4ee68e5e0f4142174c25506ee7855ff8e2e9341be855a27deb6bd51e02054ee87b46e2e70a91428c01dcb3ede31b779b7d4970b0d1d1eb9ba13db953ab8151d7aa927e6da57379339056ce80e7abc021f0183d44b0bbbd4faad56de7a7242a1c0ca2b4c6114514f6e4a6239743c9a5502f30889453cb9cc71b8dc3f01ef86ced3bfd3064d97e609a01887c8bdc0034f30f69db68a6a9e03f106d0d1b7f28f72f81f65c6d8fc9f749eaaea4796bba294f20f1fd2e759149b0866fafc3db217f2fafad1147898fe674fdfe203217a910b8c54727936ea32a6ed89788e2c370763ff90749c1ab5049b249caf649d47823a15e134b7eacd69454dbd7bacb75c467f46cf4f7d89966a05401cec2eb32900839f86e968ddb7a0502375a27914836053abe9963d83fbd30b890884cbf9cba5ebf2a8f046bb9e80f5e24c45c3a99655809eec11272d9b98bf9ea656e7f02c0ffad8d279328740004d906508df6dd5fab0bb76b49ca932176f431a92feadd1198315487ef1315e69f199fed310b72c7ff7c600fe5dd116d62e45fb235451069bd60b0173ae5a93b4d9278157f10836c195afb6b661dd556b0d958b07e5de6f9c5f9acee8ad5d98479c6b19e315d0745489e9051b30c900b4b08209688b45b7dc2c6c913c30bb01b34dd0af79f5d1b055577dc708f83f5d0da576a8e75329405d79d2691690b5e17c1f0b6ca9a3457743f187d4c538f2936fa26495b600b8b9a93c7b724c88d16a6948e2888723bb5fb902380b18a0d40b18a642499a8d43565aec7308ded8e8c2bf7b4ab3bd1ba1b60cf50e7a32bb3c0ee191659fcb2c8b25551ccf9e3564c6bc30faddcb11499d9593f4e931b85a26ab71851ff56bf757c3d578df5ec86311f359f616006c731f02cf91477376ffaa55772a1f552db1427e9637dc5d1c0b6aefd0903211805e1c7614168f22e84e058226edee8479567bb448e097339b016d993a55baec59826821115d29c60b59b1bed7a5e6dd5357527ad9577ce18e506d82dd26795e487a7adc86afdc3fa779c8a11b5356587837b5d50f864e1b8d9362cd510ebc577a9f55a8b35589483fff9d45661ab9e5a4405ef80c4600a7b7ac92073e78096f81e3c2c0bc94275c86c521dfc1a918d48ba89e5c5b3556ba845f8b06b1f62fbac7c6b45aba5a7cf794f99dfd6de407fa184a6333e022e643221d7895443f4ee13c7278c194abdc1f1bbefb30b18117b9e9c4629e29338bd2aa9601d6fb94fac26e707ac8177162758c4c6ef4fee2feaacc564ec4eec24a37ba229e3b4b59666528c747a7ff2513fd74399703af7f3698f9708a2c60fcf8f8557f9e15dfc742e763d73c666504675bc0344384f88d704deb075371a426a5a8c74ca81bb07194b9ee1a73d2729f687b4f6f7733a113219cb2997116a281a14fedf20d7d7a32d4ae59707e877abf4d048d5af8cddaf699b43d590ef2085e1471e59d87d4e1c124acfb74c4a371e54b1bd870bd46c7b08171fad7ab9efd2925639d31c6d51d925892ca5d68e3a3d90c6fa2b3ac98bc289f171df10701c49cc393885adb1a0c6940b1ad6db1a73577f7ab8c24b0e837b8c504f1e53c220e101e2897ed196479a4099eeda5141b90513e94737ea12a7d4dee854fb1d6c5a49a7a315e651f1e6049a6bbc67e1c5bc9fd3c7cf2e6317fcca0e92181a3fcacb4bec349524af5d80e7d3a57d287161e215a3ea1428c1b0f9affccbedebb9b01ef44632fbed227ad8b0e8ddcc0fa1a1302ebaa1ca861922f45dfd6c26b30891a0a4efc7476ba5f57d3e324a1facf0f852d21b4999de384346b58b74df4d524b76801e2d815eae4332395e2f336957a104f32142fcb975c6f8ac89e87f45def9dfafed6d97c45f39a7d311ec9ec65a4323ed968dcdd65e2d22863fac0ca80326879f1e48a0315810da7687019b673a9ca675dd5039315a04124c64ee501fc55bdfd361faf481e2bff50411846e8b4b5e8b6357c94edc9cceb1d927895477c016f50f71bb2e40e8553209d08b65c040c912021821f2aec527cf27843bef629a1fc7ea0305e9a7b7b75af1b9225a40a75915890ddef085d7bb7591637241c35153f41ad2cd9475453169485b23b2f5973b27341b9ef7c2dc7268089b95a331fcef8e54d23543f369cdd78ac34ff99b2d8784f2e3c60ae1dcdfec71a7c1e2284eb7082162a1a092bf963fbbe401b25214b99cbcf6da30c597fdcc093e3ce0a9a172e46f4eadb6c73b30cd12f828c927820522d637a2638f379a4ad9eddc1536d8c56c3e02946deeae35d050d1254413907ad17b6f661d4fbd36c04312cbd72b565a2187bcfba911afa821249634a59c69fd7a34841f8200564f3afd1c3031e9453a301eb9919d6a4aeda8d662542f2a06fa5485d56ce769097318bbfb416a75315d12de3b51a6a05f66ee64329e12cb7d0d774764bbc735b63b33e6410940ad02c73b176b975cc21b1e55b62b514c92050b59080319047f88ed054831af1ecf61f285cfd8308548b3c377027357fc84f7b88e611ca264a70b6698e61ddc693866f8d3712679ebb93e5cc7c01625ea538a31ccab0c77c96242b9453c86d2ed6c0232ade2eff2c8533f6faeb5e60b4c814bd2a19e101934cfe92f8eca7e1fdbd2b923aa119d7e0d0884b5d97d240d88062e2a9787879b73a531f4eb5cc5b073965e07fbefa8f0c5cb93f06f1f7346352ecd5a4e43c9b9b51ed8a755ab0d167a849549ad68a11ce3e239fd224ceabaf78c2c6828c6ab8767fb986c74e8836ffc32508d9a73ce759d407ae4ea9fbd96a8a412d7d2f02e748300a571b2535283bdd7275ce1d942593daaf4ab3f456bb0948c0b8e2b92e0b973f990ccf87d3f7fc90da9fa1acac43259ecd4baf6d5d396705e9973f49ef1cadf4b7083eafb3e63ba97a3bfa2926705491c5e65575108771c10917b82e04f17ffc274b4ee2a3257e83ca67e4b9f79a1ec0f93ac01a05f39c785a82a67c981e6b4a5c5a777494a8a3c4970d92673d4540c9e9cc0ba511977bb085a3d158ed8a760e9e87126803f0635d7be374cfa28282e333b71afcf5e7803874ffac3f1cad9b55dc95ffaae5c53f0d6a1b1ca9cf17f80f14fa5b94ed3d73efd8ab81fe40a05ab1b7d84d7102800f0cf5198a72a5b1876153169bd450ec7828dad21090ad9ecc55b763a28fc6a94c2feff335e8fecd78632a9c6964887f82027d5a29065f8c45993f92fa95b769c99d9c73cade5247e24bde638a35bd26fa9cf08fe80f036ac9c6360ed75f2173e0ca1bcab5230ef976b3fb25ee71d9a502e37a51b06074e2f3aff58924c985b49241ed8cd92ed78acd91ae1ca6b197c7feaee47ff874fb97e2074fc98f433507d0929782efa3ffa062f68683daaeaa1470e3401ff3b421538fb180435a7d82d83b021012daf3c08c3619e46af313ca52a59bf088be25971f28b70ec81ad36a24ce405bafdddb2e4932cf5cd7714e1b9a8d43ca84250dbb6254f6a21de70386daea9f72035cabc63180d30d05602fb1db1061ffae9202fc6cebea70a1cc582f6815ee194a811b2fa9fb7584be6599b439fc390594d762848a1f65fdafe71a45f027cb671820b3281dba793911c7b94166d29c642ef02596c8b7abd2a5b2126cacea2fa5da2714e65d3ec16484a8c3388c0e21e788e9c80a5739810b064b23aa05828569487f448608bd92eab97d7b749f0d530ad036073a7eba569e7d948ab98458c94e862c94c81136bf52ef36ec8cac0dca29d6ccceb0ad9529fec5238e94e5bdfb1f3a491a2485f555a7d5c87af504a93429d830efe530786d65334da63938e66ff3e542a5cfa5d011e1dee220d6f69d18d3021c75e999838f29d44c15e6bf6f24515cfb5242fc3c3ec2bdc2f8ab029b7033535c4a264c302f6a1f6d741015389c55747e34958f402fa19baec24faf908aedc579adc8bb0fc81b84594b5ee3376644123ea67a7c9934605934c457b9dff076e916715372df62418682ca394073d7a5fea1a5e72e2a1ac26e7a12fee4c5b4f1c66ac4b3a2b2f63507047f7c74abfe252d61e88582ca541d647ad3932c080fef824edec0dba1fd35e55f34e54e2c99c6c5ae884f2cca98ca28a341a1a42159492695200f81d76cbe2a4e58506d761984eef9dbc83751904fed46fd23a7c9285cdf9abe0d1825fadedc9f4e2f874686b0f307186aa2c2267a0be4e57e27e7daeffc5a3e4da1ad2fdb71221728a789249bb2b60c265c800a02f472f62a6792af3445012cb5c2bdbc821d2b45d0d604ab831e471cc66c66249a6d2327d6b5a12925139a0543be365ee7bc7f08e70dfffc2abb90a7e6fb7a5caf8cc264e5ec36f1ea792ffa18df733b42475ccbaf424951f3c384eca2e455dc67a1a634a559b2738647f19e02d308aacc9ec6a97b04c2deff82d19a7eaf2837b4aaa0c8b978bda1930c8ff662a4f8b7f4048eb0c3cae76f18103576ec8b44eb0f0d9e909bc7da90c8c6fb355106d89d3e7c3b1fee9bc3c723603b8b8d4e534bf166fd86d45e9f5da27ea6f422f1b85c969b00e102b62d3270cc1410c6cabb10b45c5813ed2cea5166f6fa418724f950941e969e79c6e126610c91225f7451001f125daec33671b2fb687166a9bb768ecf368307dbd852b1d97d6f35a2bb2865824a88104a7a0a2e83c3fe2c4d4ed9cb67e8136c60bd25a51e67c969ab23d0282dd9ed460f8426d2fe47317a417a7aa420eb92b9144500885ee5db62e6451e35e9054ff7ce3ac27ca5400dbb28e313bfebd515b659dde607e7f47c871d42f2ba366b5116590b9fa0947930aa457e7733bc1df60fabf0df01c3c1b30a630bd9690138d8e66aa3bb5e582e8198e9cbed866191d7d7d11f9f708f6a6cd2537b119b0bb88f29f4b440c58d9e34ef2e30349842f5e669fb805cb48b04573c86ed55c5c1116ea40d1ab61cc4bf9ae4ec78b7f0f603813d5", 0x1000}, {&(0x7f0000002bc0)="117057f397e51bdb37947503842ab203a4cf63c90b436e11f3a6d6abe0c39500691e53449adfb5bc66c0623b6afa500bf81643b6c4dc8a607322198b7a79100cb119adc68cf0f6543d74ccd8194489805917896070b5853bb995fe105fd88a8b285a44357c6c1748d98a3e", 0x6b}, {&(0x7f0000002c40)="6e444dd60029135a3f1904", 0xb}, {&(0x7f0000002c80)="0ddc2e6558aec6cc4279f07ae2d1efcfc7c0b070b1b81f9c0455391ea76b574481458f7ba6c35212795bfdb16c08e82dbfbe2f2c97ae3cbcbd9e6472ba05df47828b3f5af21ed0b248d4f98553807d67d21838325b871086fa56c15de29d2520a2eb78340486f28a39e5677e942f3be9fe2b931efb11afac9d17fa559da4fd2326ef489ce2d0a3687603153c6fe94a42cf52caa8f88124ac04046fefc3fb4674ed4166253aa7871c9df0772d27627e44f1c9", 0xb2}, {&(0x7f0000002d40)="548e9673b5657f2517cf7366cdce7717b9584f236f8e95a539a4575d491e277b20bec639dc8600", 0x27}, {&(0x7f0000002d80)="b4758856ef912229ae57b6c5872cdf6fea44c6f3ba42b071afd134d4043b41bbbcd957368bdc23c95a54c5e1983eadb3495aad7e17a198918ba02f15a6f86308b5da991a01562d4eb94e4157bcfb453fb73cc3b2bf601adaf629210640c025337a710fc6b41af4656b200f81c2030f055c2b2eb209aff2fa8341790ff842a5dce205b079b6b1a350825b2a8265c498ae8bb15be6827c989097e22059a340738f36a80b1bb05b174156dd5bad8a682a3364cd61a52d1fcaea310435db7b568d66c854c94ad29f9e4e4ae4b61d1faa4bede5bf314dbffe1df57a00a13afb5c", 0xde}], 0xa, &(0x7f0000003100)=[@authinfo={0x18}, @authinfo={0x18}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x8000, 0x9, 0x1, r1}}, @sndinfo={0x20, 0x84, 0x2, {0x2, 0x8207, 0x6, 0x80000000, r2}}, @init={0x18, 0x84, 0x0, {0x6, 0x400, 0x6, 0x2}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0xb8, 0x4000000}], 0x3, 0x45) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={r1, 0x0, 0x10}, 0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0xf, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}]}, &(0x7f000045c000)=0x10) 15:25:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000013a, 0x0) 15:25:27 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x97ffffff, 0x0, 0x100020, 0x0) 15:25:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x5, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc0000000, 0x0, 0x100020, 0x0) 15:25:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000013b, 0x0) 15:25:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12f, 0x7fffefa5) 15:25:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12e, 0x7fffefa5) 15:25:27 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000013c, 0x0) 15:25:27 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf5ffffff, 0x0, 0x100020, 0x0) 15:25:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12e, 0x7fffefa5) 15:25:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x130, 0x7fffefa5) 15:25:27 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x8, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x12e, 0x7fffefa5) 15:25:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000013d, 0x0) 15:25:27 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x5, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000013e, 0x0) 15:25:27 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf6ffffff, 0x0, 0x100020, 0x0) [ 658.971535] EXT4-fs: 36 callbacks suppressed [ 658.971588] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:28 executing program 0: setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) setrlimit(0x3, &(0x7f0000000040)={0x100000000}) 15:25:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x131, 0x7fffefa5) [ 659.046567] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 659.066671] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000013f, 0x0) 15:25:28 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x2) setsockopt$ax25_int(r0, 0x101, 0x800000000004, &(0x7f0000000000), 0x4) 15:25:28 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf8f73f00, 0x0, 0x100020, 0x0) 15:25:28 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000380)=ANY=[@ANYBLOB='z'], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:25:28 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x10, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000140, 0x0) 15:25:28 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x200000000000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2c21202e2f6622ab976c65300a9f5611fd14bdb53ad8"], 0x16) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000a40)={0x16, 0x398, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0xa0) fcntl$getown(r2, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@multicast2, @multicast1}, 0xc) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000080)=0x148, 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4}, 0x1c) ioctl$UI_DEV_CREATE(r3, 0x5501) 15:25:28 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfcfdffff, 0x0, 0x100020, 0x0) 15:25:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x132, 0x7fffefa5) 15:25:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000141, 0x0) 15:25:28 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfdfdffff, 0x0, 0x100020, 0x0) [ 659.476924] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 659.495746] input: syz1 as /devices/virtual/input/input8 15:25:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}, 0x2}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendto$netrom(r0, &(0x7f00000002c0)="5f77124013ece96c024e64446ad4", 0xe, 0x40000, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @default, @null]}, 0x48) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000240)={0x3, @bcast, r4}) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) [ 659.603107] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000142, 0x0) 15:25:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x133, 0x7fffefa5) [ 659.642495] audit: type=1800 audit(1548257128.593:50): pid=21021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17217 res=0 [ 659.710393] audit: type=1804 audit(1548257128.623:51): pid=21021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir632263008/syzkaller.VfwR25/698/file0" dev="sda1" ino=17217 res=1 15:25:28 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfdffffff, 0x0, 0x100020, 0x0) 15:25:28 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2d, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000143, 0x0) [ 659.858818] input: syz1 as /devices/virtual/input/input9 15:25:29 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x200000000000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2c21202e2f6622ab976c65300a9f5611fd14bdb53ad8"], 0x16) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000a40)={0x16, 0x398, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0xa0) fcntl$getown(r2, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@multicast2, @multicast1}, 0xc) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000080)=0x148, 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4}, 0x1c) ioctl$UI_DEV_CREATE(r3, 0x5501) [ 660.007549] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:29 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfeffffff, 0x0, 0x100020, 0x0) 15:25:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000144, 0x0) 15:25:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x134, 0x7fffefa5) [ 660.111883] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x48, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 660.256858] input: syz1 as /devices/virtual/input/input10 15:25:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000145, 0x0) [ 660.442410] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 660.540549] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 660.836744] audit: type=1804 audit(1548257129.793:52): pid=21024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir632263008/syzkaller.VfwR25/698/file0" dev="sda1" ino=17217 res=1 15:25:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x135, 0x7fffefa5) 15:25:29 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffdfc, 0x0, 0x100020, 0x0) 15:25:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000146, 0x0) 15:25:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2d, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4c, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}, 0x2}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendto$netrom(r0, &(0x7f00000002c0)="5f77124013ece96c024e64446ad4", 0xe, 0x40000, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @default, @null]}, 0x48) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000240)={0x3, @bcast, r4}) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 15:25:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000147, 0x0) [ 661.120924] audit: type=1800 audit(1548257130.073:53): pid=21078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17291 res=0 [ 661.140931] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:30 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffdfd, 0x0, 0x100020, 0x0) [ 661.192553] audit: type=1804 audit(1548257130.113:54): pid=21078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir632263008/syzkaller.VfwR25/699/file0" dev="sda1" ino=17291 res=1 15:25:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x136, 0x7fffefa5) 15:25:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}, 0x2}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendto$netrom(r0, &(0x7f00000002c0)="5f77124013ece96c024e64446ad4", 0xe, 0x40000, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @default, @null]}, 0x48) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000240)={0x3, @bcast, r4}) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 15:25:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000148, 0x0) 15:25:30 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x68, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:30 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffff8c, 0x0, 0x100020, 0x0) [ 661.564968] audit: type=1800 audit(1548257130.523:55): pid=21093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=17073 res=0 [ 661.665810] audit: type=1804 audit(1548257130.543:56): pid=21093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080376465/syzkaller.JDRd8k/535/file0" dev="sda1" ino=17073 res=1 15:25:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x48, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000149, 0x0) 15:25:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x137, 0x7fffefa5) 15:25:31 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffff97, 0x0, 0x100020, 0x0) 15:25:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6c, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000014a, 0x0) 15:25:31 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffff5, 0x0, 0x100020, 0x0) 15:25:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x48, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:31 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6c, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000014b, 0x0) 15:25:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x138, 0x7fffefa5) 15:25:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x74, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffff6, 0x0, 0x100020, 0x0) 15:25:32 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x48, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0) 15:25:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffffd, 0x0, 0x100020, 0x0) 15:25:32 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6c, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x139, 0x7fffefa5) 15:25:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000014d, 0x0) 15:25:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffffe, 0x0, 0x100020, 0x0) 15:25:32 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x10, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:32 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7a, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000014e, 0x0) 15:25:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x420a0000) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff, 0x9}, 0xa) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl(r0, 0x6, &(0x7f0000000480)="b127910a2513e0ff7f9edbbbeb0e0b1330f88683568b92162041983f04671fab9f94c3d89173ff809f6dae08abd44e3d60309a160997a7f9ca7686840153761c8ff48cd0fff170b24661a99486eeebf96f6ee93635a0e2568844d881a272a3b4827a4906019b556a4e9070e883882bf9") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000140)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x4e23, 0x0, @mcast1}, 0x4, [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000800)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f0000000740)={0xb0, r2, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd48e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x200480c4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f0000000100)={0x3, @default, r1}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') socket$pppoe(0x18, 0x1, 0x0) lstat(&(0x7f0000000600)='./file0//ile0\x00', &(0x7f0000000640)) renameat2(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00', 0x7) socket$xdp(0x2c, 0x3, 0x0) 15:25:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000000, 0x0, 0x100020, 0x0) 15:25:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x13a, 0x7fffefa5) 15:25:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000014f, 0x0) 15:25:32 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xc0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:32 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x10, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000000000, 0x0, 0x100020, 0x0) 15:25:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000150, 0x0) 15:25:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x420a0000) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff, 0x9}, 0xa) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl(r0, 0x6, &(0x7f0000000480)="b127910a2513e0ff7f9edbbbeb0e0b1330f88683568b92162041983f04671fab9f94c3d89173ff809f6dae08abd44e3d60309a160997a7f9ca7686840153761c8ff48cd0fff170b24661a99486eeebf96f6ee93635a0e2568844d881a272a3b4827a4906019b556a4e9070e883882bf9") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000140)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x4e23, 0x0, @mcast1}, 0x4, [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000800)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f0000000740)={0xb0, r2, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd48e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x200480c4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f0000000100)={0x3, @default, r1}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') socket$pppoe(0x18, 0x1, 0x0) lstat(&(0x7f0000000600)='./file0//ile0\x00', &(0x7f0000000640)) renameat2(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00', 0x7) socket$xdp(0x2c, 0x3, 0x0) 15:25:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x13b, 0x7fffefa5) 15:25:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4000000000000, 0x0, 0x100020, 0x0) 15:25:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000151, 0x0) 15:25:33 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x10, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x300, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x420a0000) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff, 0x9}, 0xa) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl(r0, 0x6, &(0x7f0000000480)="b127910a2513e0ff7f9edbbbeb0e0b1330f88683568b92162041983f04671fab9f94c3d89173ff809f6dae08abd44e3d60309a160997a7f9ca7686840153761c8ff48cd0fff170b24661a99486eeebf96f6ee93635a0e2568844d881a272a3b4827a4906019b556a4e9070e883882bf9") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000140)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x4e23, 0x0, @mcast1}, 0x4, [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000800)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f0000000740)={0xb0, r2, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd48e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x200480c4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f0000000100)={0x3, @default, r1}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') socket$pppoe(0x18, 0x1, 0x0) lstat(&(0x7f0000000600)='./file0//ile0\x00', &(0x7f0000000640)) renameat2(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00', 0x7) socket$xdp(0x2c, 0x3, 0x0) 15:25:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8000000000000, 0x0, 0x100020, 0x0) 15:25:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000152, 0x0) 15:25:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x13c, 0x7fffefa5) [ 664.232267] EXT4-fs: 14 callbacks suppressed [ 664.232288] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x10000000000000, 0x0, 0x100020, 0x0) 15:25:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000153, 0x0) [ 664.295887] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000005c0)={0x0, 0x1000000002, 0xfeaa, &(0x7f0000000580)=0xff}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105001700200000000a00000000000017000500e50000070000001f0000000000fc2500000000000002f100010000000000000000020000627c05000500000000000a00000000000000ff170000000000001f000000e5ca4573af68685c78bf32"], 0x80}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[], 0xfffffffffffffc66}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000280)) [ 664.393558] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x500, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x13d, 0x7fffefa5) 15:25:33 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/158, 0x2000, 0x800, 0x7}, 0x18) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x5, 0x40c00) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 15:25:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x100020, 0x0) 15:25:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000154, 0x0) [ 664.601161] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:33 executing program 0: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x20) r2 = syz_open_dev$usb(&(0x7f0000001c00)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4002000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0x81, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x6, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x71, 0x0, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", 0x0, 0x82}, 0x28) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0x5f1) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x20) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 15:25:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000155, 0x0) 15:25:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, 0x0) 15:25:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x13e, 0x7fffefa5) [ 664.705171] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x600, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000156, 0x0) [ 664.979987] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 665.064206] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000005c0)={0x0, 0x1000000002, 0xfeaa, &(0x7f0000000580)=0xff}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105001700200000000a00000000000017000500e50000070000001f0000000000fc2500000000000002f100010000000000000000020000627c05000500000000000a00000000000000ff170000000000001f000000e5ca4573af68685c78bf32"], 0x80}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[], 0xfffffffffffffc66}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000280)) 15:25:34 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x200000000000000, 0x0, 0x100020, 0x0) 15:25:34 executing program 0: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x20) r2 = syz_open_dev$usb(&(0x7f0000001c00)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4002000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0x81, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x6, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x71, 0x0, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", 0x0, 0x82}, 0x28) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0x5f1) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x20) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 15:25:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x13f, 0x7fffefa5) 15:25:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000157, 0x0) 15:25:34 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x700, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000158, 0x0) [ 665.542431] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:34 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x300000000000000, 0x0, 0x100020, 0x0) [ 665.614501] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:34 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x600, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000159, 0x0) 15:25:34 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf1a, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x140, 0x7fffefa5) [ 665.877478] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf1a, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:35 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x400000000000000, 0x0, 0x100020, 0x0) 15:25:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x600, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000015a, 0x0) 15:25:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x141, 0x7fffefa5) 15:25:35 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1a0f, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:35 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, 0x0) 15:25:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000015b, 0x0) 15:25:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x142, 0x7fffefa5) 15:25:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x600, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:35 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, 0x0) 15:25:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000015c, 0x0) 15:25:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf1a, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x600, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:35 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x143, 0x7fffefa5) 15:25:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000015d, 0x0) 15:25:35 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, 0x0) 15:25:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1a0f, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:35 executing program 4: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x20) r2 = syz_open_dev$usb(&(0x7f0000001c00)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4002000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0x81, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x6, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x71, 0x0, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", 0x0, 0x82}, 0x28) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0x5f1) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x20) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 15:25:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000015e, 0x0) 15:25:35 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xa00000000000000, 0x0, 0x100020, 0x0) 15:25:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x500, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x144, 0x7fffefa5) 15:25:36 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x143, 0x7fffefa5) 15:25:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000015f, 0x0) 15:25:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x500, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000000000000, 0x0, 0x100020, 0x0) 15:25:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000160, 0x0) 15:25:36 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2d00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1a0f000000000000, 0x0, 0x100020, 0x0) 15:25:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x145, 0x7fffefa5) 15:25:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x500, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000161, 0x0) 15:25:36 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x100020, 0x0) 15:25:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000162, 0x0) 15:25:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x146, 0x7fffefa5) 15:25:36 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, 0x0) 15:25:36 executing program 4: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x501000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000000c0)={0x7fff, 0xfffffffffffffffb, 0xffffffffffffffba, 0x5, 0xb6}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_set$pid(0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) 15:25:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000163, 0x0) 15:25:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x100020, 0x0) 15:25:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000164, 0x0) 15:25:36 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, 0x0) 15:25:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x147, 0x7fffefa5) 15:25:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000165, 0x0) 15:25:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:37 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, 0x0) 15:25:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 15:25:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000166, 0x0) 15:25:37 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4800000000000000, 0x0, 0x100020, 0x0) 15:25:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x148, 0x7fffefa5) 15:25:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:37 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4800, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000167, 0x0) 15:25:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:37 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x100020, 0x0) 15:25:37 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) semget$private(0x0, 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000400)='encrypted\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)='$', 0xfffffffffffffff9) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0xce3}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000740)={r3, 0x8}, 0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000280)={'gretap0\x00', {0x2, 0x0, @multicast1}}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xfffffffffffffffd, 0x4) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x6, 0x3ff}, &(0x7f00000004c0)=0xfffffffffffffe21) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000500)={0x80000000, 0x0, 0x5, 0x4}, &(0x7f0000000540)=0xffffffffffffff80) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="580000007d0000000051000000060000008002000000060000000000000000000400feffffff03000000ec000000030000008e2e2404006e66730008006772657461703000a3002f6465762f7161745f6164665f63746c00"], 0x58) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000005c0)={0x28, 0x2, 0x0, {0x3, 0x0, 0x2}}, 0x28) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) sendmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000a40)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @broadcast}, 0x3, 0x2, 0x4}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d80)}], 0x1, 0x0, 0x0, 0xc5}, 0x4040) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ns\x00\x00', 0x0, &(0x7f0000000900)='./cgroup/syz0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0x8, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0x13}, @ldst={0x3, 0x3, 0x1, 0x2, 0x0, 0xffffffffffffffc1, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x32}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0xfffffffffffffff8, 0xc, 0x0, 0x3, 0x100, 0xfffffffffffffffc}, @jmp={0x5, 0x81, 0xd, 0xf, 0x5, 0xfffffffffffffffe}, @alu={0x7, 0x2, 0x7, 0xe, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000480)='GPL\x00', 0x80, 0x62, &(0x7f00000006c0)=""/98, 0x40f00, 0x1, [], r5, 0x5}, 0x48) getpid() write$UHID_INPUT2(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="0c0000000000b5c974eeea4064a822aa8809737ba9feb201ebc68adc0e5440227e7bc72f674633b25274bbd0d2e1197f730cdfd050922a4b05baefd2e14a87e7e085d9c2e6897e9eda322c7911ec088445aa0000000000000000100000000000000001000b73bd6eb0ea1b9de6508e900f30c8c8f5e83a57d842094108d8db1b8ea9dc86f5f0493774fc9ab1ef62a43d913dade0debac88c4f60e7ecc826e3a7faa2d4cb4a5c2ace377fb3fc0453766d495e7467c150f297f88cb29ac3a0e2f290889df4f7b176f820496bd5b51e403266ad3ab0b041bdc0c5af62e1435e1addf677291595d8ec922de528f3b3cf186dc53cc75337fcf81a3aa8ddf779aecfe24a8370f0a007c0304a7c58b10a86b27e88fe0a16bc4dddf3769b2b5ec46501b294e07b6a227eb789e209c5f00b18a0fd7a531c398d851a4f4b4fe23b463b07bd59879e7ccfb5a416e026ea01e1bb6ef37149a90ae378f7bf32379279af43493c8bc7207a4b2d8fe8e5ac14d687407a3877"], 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x1, 0x4) ioctl$KVM_PPC_GET_PVINFO(r1, 0x400448e3, &(0x7f0000000280)=""/88) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x8, 0x4) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000b40)={0x0, 0x4, 0x9}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) 15:25:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x149, 0x7fffefa5) 15:25:37 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x1, 0x40001) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000900)=0x5, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pivot_root(0x0, 0x0) ioctl$int_out(r1, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000640)) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, 0x0) getegid() ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000180)={0x0, 0x1}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000000)={0x6}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x8000, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c61bd616d573d776c63002c6d6d61702c76657273696f6e3d3970323030302c7375626a5f726f6c653d862c00e9935f334a93b03184cedd373c0d4e527ac5a1f20421a1c32e1e8ac6031db3a8f7cb73a182e7555f91d4b001411af4642cd23315fa"]) mount(0x0, 0x0, &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='P\xf0selinuxcgroup\x00') ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x3) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001200)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000001}, 0x20044880) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) 15:25:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000168, 0x0) 15:25:37 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6000000000000000, 0x0, 0x100020, 0x0) 15:25:37 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4c00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000169, 0x0) 15:25:37 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6800000000000000, 0x0, 0x100020, 0x0) 15:25:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x14a, 0x7fffefa5) 15:25:37 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6800, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000016a, 0x0) 15:25:37 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x100020, 0x0) 15:25:38 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) semget$private(0x0, 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000400)='encrypted\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)='$', 0xfffffffffffffff9) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0xce3}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000740)={r3, 0x8}, 0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000280)={'gretap0\x00', {0x2, 0x0, @multicast1}}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xfffffffffffffffd, 0x4) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x6, 0x3ff}, &(0x7f00000004c0)=0xfffffffffffffe21) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000500)={0x80000000, 0x0, 0x5, 0x4}, &(0x7f0000000540)=0xffffffffffffff80) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="580000007d0000000051000000060000008002000000060000000000000000000400feffffff03000000ec000000030000008e2e2404006e66730008006772657461703000a3002f6465762f7161745f6164665f63746c00"], 0x58) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000005c0)={0x28, 0x2, 0x0, {0x3, 0x0, 0x2}}, 0x28) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) sendmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000a40)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @broadcast}, 0x3, 0x2, 0x4}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d80)}], 0x1, 0x0, 0x0, 0xc5}, 0x4040) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ns\x00\x00', 0x0, &(0x7f0000000900)='./cgroup/syz0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0x8, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0x13}, @ldst={0x3, 0x3, 0x1, 0x2, 0x0, 0xffffffffffffffc1, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x32}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0xfffffffffffffff8, 0xc, 0x0, 0x3, 0x100, 0xfffffffffffffffc}, @jmp={0x5, 0x81, 0xd, 0xf, 0x5, 0xfffffffffffffffe}, @alu={0x7, 0x2, 0x7, 0xe, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000480)='GPL\x00', 0x80, 0x62, &(0x7f00000006c0)=""/98, 0x40f00, 0x1, [], r5, 0x5}, 0x48) getpid() write$UHID_INPUT2(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x1, 0x4) ioctl$KVM_PPC_GET_PVINFO(r1, 0x400448e3, &(0x7f0000000280)=""/88) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x8, 0x4) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000b40)={0x0, 0x4, 0x9}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) 15:25:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x14b, 0x7fffefa5) 15:25:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="d8d68c1fcccad71e1c8fcd549bb4833d7ba2500614cabe8345b4c1806cac23f23bc0537619351fdc2a192592fe8af3c38b54ef9de8e7a3eb6d71f1408e199573a03f587f42bff043ef66fd0cf936455333ee4d2281ff3f0886691089ffdf7c11273d75e9bac814eb37290226d389e8d13f220f72448290ef4c271fd8a4d2f817bcc799b830db17c7957a02eb487e52928e29cb92627cb9fe38b8a4543f25af0b09401a29d0c5f6", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00\x00\x80') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000003440)={0x0, 0x0, 0x2080}) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000000400000000000000000000000100000000000000be00000000000000020000000000e9ffffff"], 0x2a) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000b00)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e21a1b9dcc33db7762efad262cdcef5d3b6354e601019df973b53d859e769464fe2a2410d59cb4576ec235715c18a01391d735c55170db1000001000000000096dbcd16139bf9711b5e19d7c2d589376ed5f17e4f93d0fa5acbc4b478ad45256808a4f886f0b171f65fe1882b1a0f52bcb1607d6f80b2d0b94bada1d0310ee88be9c34538f88570e07ccea79367a32bb8f4f325f267df"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB="6bc112ea292ddd949b2567b54791fd78c31bcaa3aad4e90ba4d22a49dd84aaff2bb3a0094931b68da6b59c79013f2f94318ab732cfd759ddc182eecdb993c19029222a06b4f1699c768be0177d2bb6c7217176ca16edfd5f979f6397c23feedf2bfc49d8a8f66e4cfa0d4aa15898efdd1118d1ab3fd48c17647f18b275167947eba37f534dea6aeb1f999e0f93ca162cd9875a3630100f35479892ab39a7717f29b99a92f1e2604216e66098f4055f7159159fea74d453267c24a4dad9b98bb98b46978b7e29e811141330d9ecf6eaeeeee61b75a5dd771e21951a20"], 0x0, &(0x7f0000000680)='ramfs\x00', 0x80000, 0x0) r4 = dup2(r1, r1) ioctl$TCSBRKP(r3, 0x5425, 0x5) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x5, {0x0, 0x3}}, 0xfffffffffffffeb5) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$NBD_DO_IT(r4, 0xab03) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r2, &(0x7f00000006c0)=[{&(0x7f0000002440)=""/4096, 0x1ba}], 0x10000451, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) close(r1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000840)={{0x2, 0x4e22, @local}, {0x306}, 0x0, {0x2, 0xfffffffffffffffc, @multicast2}, '\x00\x00\t\x00'}) fcntl$setflags(r0, 0x2, 0x0) 15:25:38 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7400000000000000, 0x0, 0x100020, 0x0) 15:25:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000016b, 0x0) 15:25:38 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6c00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:38 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) semget$private(0x0, 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000400)='encrypted\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)='$', 0xfffffffffffffff9) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0xce3}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000740)={r3, 0x8}, 0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000280)={'gretap0\x00', {0x2, 0x0, @multicast1}}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xfffffffffffffffd, 0x4) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x6, 0x3ff}, &(0x7f00000004c0)=0xfffffffffffffe21) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000500)={0x80000000, 0x0, 0x5, 0x4}, &(0x7f0000000540)=0xffffffffffffff80) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="580000007d0000000051000000060000008002000000060000000000000000000400feffffff03000000ec000000030000008e2e2404006e66730008006772657461703000a3002f6465762f7161745f6164665f63746c00"], 0x58) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000005c0)={0x28, 0x2, 0x0, {0x3, 0x0, 0x2}}, 0x28) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) sendmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000a40)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @broadcast}, 0x3, 0x2, 0x4}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d80)}], 0x1, 0x0, 0x0, 0xc5}, 0x4040) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ns\x00\x00', 0x0, &(0x7f0000000900)='./cgroup/syz0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0x8, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0x13}, @ldst={0x3, 0x3, 0x1, 0x2, 0x0, 0xffffffffffffffc1, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x32}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0xfffffffffffffff8, 0xc, 0x0, 0x3, 0x100, 0xfffffffffffffffc}, @jmp={0x5, 0x81, 0xd, 0xf, 0x5, 0xfffffffffffffffe}, @alu={0x7, 0x2, 0x7, 0xe, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000480)='GPL\x00', 0x80, 0x62, &(0x7f00000006c0)=""/98, 0x40f00, 0x1, [], r5, 0x5}, 0x48) getpid() write$UHID_INPUT2(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x1, 0x4) ioctl$KVM_PPC_GET_PVINFO(r1, 0x400448e3, &(0x7f0000000280)=""/88) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x8, 0x4) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000b40)={0x0, 0x4, 0x9}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) 15:25:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x14c, 0x7fffefa5) 15:25:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000016c, 0x0) 15:25:38 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x100020, 0x0) 15:25:38 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) semget$private(0x0, 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000400)='encrypted\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)='$', 0xfffffffffffffff9) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0xce3}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000740)={r3, 0x8}, 0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000280)={'gretap0\x00', {0x2, 0x0, @multicast1}}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xfffffffffffffffd, 0x4) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x6, 0x3ff}, &(0x7f00000004c0)=0xfffffffffffffe21) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000500)={0x80000000, 0x0, 0x5, 0x4}, &(0x7f0000000540)=0xffffffffffffff80) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="580000007d0000000051000000060000008002000000060000000000000000000400feffffff03000000ec000000030000008e2e2404006e66730008006772657461703000a3002f6465762f7161745f6164665f63746c00"], 0x58) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000005c0)={0x28, 0x2, 0x0, {0x3, 0x0, 0x2}}, 0x28) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) sendmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000a40)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @broadcast}, 0x3, 0x2, 0x4}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d80)}], 0x1, 0x0, 0x0, 0xc5}, 0x4040) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ns\x00\x00', 0x0, &(0x7f0000000900)='./cgroup/syz0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0x8, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0x13}, @ldst={0x3, 0x3, 0x1, 0x2, 0x0, 0xffffffffffffffc1, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x32}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0xfffffffffffffff8, 0xc, 0x0, 0x3, 0x100, 0xfffffffffffffffc}, @jmp={0x5, 0x81, 0xd, 0xf, 0x5, 0xfffffffffffffffe}, @alu={0x7, 0x2, 0x7, 0xe, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000480)='GPL\x00', 0x80, 0x62, &(0x7f00000006c0)=""/98, 0x40f00, 0x1, [], r5, 0x5}, 0x48) getpid() write$UHID_INPUT2(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x1, 0x4) ioctl$KVM_PPC_GET_PVINFO(r1, 0x400448e3, &(0x7f0000000280)=""/88) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x8, 0x4) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000b40)={0x0, 0x4, 0x9}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) [ 669.602751] EXT4-fs: 22 callbacks suppressed [ 669.602811] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x14d, 0x7fffefa5) 15:25:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000016d, 0x0) [ 669.793790] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:38 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7400, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="d8d68c1fcccad71e1c8fcd549bb4833d7ba2500614cabe8345b4c1806cac23f23bc0537619351fdc2a192592fe8af3c38b54ef9de8e7a3eb6d71f1408e199573a03f587f42bff043ef66fd0cf936455333ee4d2281ff3f0886691089ffdf7c11273d75e9bac814eb37290226d389e8d13f220f72448290ef4c271fd8a4d2f817bcc799b830db17c7957a02eb487e52928e29cb92627cb9fe38b8a4543f25af0b09401a29d0c5f6", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00\x00\x80') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000003440)={0x0, 0x0, 0x2080}) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000000400000000000000000000000100000000000000be00000000000000020000000000e9ffffff"], 0x2a) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000b00)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e21a1b9dcc33db7762efad262cdcef5d3b6354e601019df973b53d859e769464fe2a2410d59cb4576ec235715c18a01391d735c55170db1000001000000000096dbcd16139bf9711b5e19d7c2d589376ed5f17e4f93d0fa5acbc4b478ad45256808a4f886f0b171f65fe1882b1a0f52bcb1607d6f80b2d0b94bada1d0310ee88be9c34538f88570e07ccea79367a32bb8f4f325f267df"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB="6bc112ea292ddd949b2567b54791fd78c31bcaa3aad4e90ba4d22a49dd84aaff2bb3a0094931b68da6b59c79013f2f94318ab732cfd759ddc182eecdb993c19029222a06b4f1699c768be0177d2bb6c7217176ca16edfd5f979f6397c23feedf2bfc49d8a8f66e4cfa0d4aa15898efdd1118d1ab3fd48c17647f18b275167947eba37f534dea6aeb1f999e0f93ca162cd9875a3630100f35479892ab39a7717f29b99a92f1e2604216e66098f4055f7159159fea74d453267c24a4dad9b98bb98b46978b7e29e811141330d9ecf6eaeeeee61b75a5dd771e21951a20"], 0x0, &(0x7f0000000680)='ramfs\x00', 0x80000, 0x0) r4 = dup2(r1, r1) ioctl$TCSBRKP(r3, 0x5425, 0x5) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x5, {0x0, 0x3}}, 0xfffffffffffffeb5) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$NBD_DO_IT(r4, 0xab03) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r2, &(0x7f00000006c0)=[{&(0x7f0000002440)=""/4096, 0x1ba}], 0x10000451, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) close(r1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000840)={{0x2, 0x4e22, @local}, {0x306}, 0x0, {0x2, 0xfffffffffffffffc, @multicast2}, '\x00\x00\t\x00'}) fcntl$setflags(r0, 0x2, 0x0) 15:25:38 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x100020, 0x0) 15:25:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000016e, 0x0) 15:25:38 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6c00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000016f, 0x0) 15:25:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x14e, 0x7fffefa5) [ 670.008903] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x100020, 0x0) [ 670.112877] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 670.140281] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000170, 0x0) 15:25:39 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)='md5sum\x00', 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, 0xfffffffffffffffd, 0x0) setuid(0xee01) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) 15:25:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc000000000000000, 0x0, 0x100020, 0x0) 15:25:39 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7a00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000171, 0x0) 15:25:39 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7400, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000172, 0x0) 15:25:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x100020, 0x0) 15:25:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x14f, 0x7fffefa5) 15:25:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) [ 670.493632] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 670.508902] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000173, 0x0) 15:25:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, 0x0) 15:25:39 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x200000000, 0x1fd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") ioctl$int_in(r0, 0x80000080045005, &(0x7f0000000040)) [ 670.614462] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:39 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xc000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x100020, 0x0) 15:25:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000174, 0x0) 15:25:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x150, 0x7fffefa5) 15:25:39 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7a00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) [ 670.822990] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x100020, 0x0) 15:25:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000175, 0x0) [ 670.918662] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x100020, 0x0) 15:25:39 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x40000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x80086601, 0x711000) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000176, 0x0) 15:25:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1400) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x100, r2, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xbe47}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x48080}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x1000000000000046, 0x0) 15:25:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x151, 0x7fffefa5) 15:25:40 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x100020, 0x0) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000177, 0x0) 15:25:40 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x80000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x80086601, 0x711000) 15:25:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x800000100000005, &(0x7f0000000040)=0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000000c0)={{0x100, 0x7900000000000000}, 0x1, 0xfff, 0x7, {0xfff, 0x1}, 0xfa46, 0x1f}) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)='1', 0x1}]) 15:25:40 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x100020, 0x0) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000178, 0x0) 15:25:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x80086601, 0x711000) 15:25:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x152, 0x7fffefa5) 15:25:40 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x100020, 0x0) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000179, 0x0) 15:25:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x800000100000005, &(0x7f0000000040)=0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000000c0)={{0x100, 0x7900000000000000}, 0x1, 0xfff, 0x7, {0xfff, 0x1}, 0xfa46, 0x1f}) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)='1', 0x1}]) 15:25:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:40 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x100000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000017a, 0x0) 15:25:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x153, 0x7fffefa5) 15:25:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:40 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100020, 0x0) 15:25:40 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="3000500cf610cb9ec139f795b59ecdf3e5e033edc5ac6e2e222e5416104dc093df303761ac705f", 0x27) rt_sigtimedwait(&(0x7f0000a72000), &(0x7f0000000080), &(0x7f0000000040), 0x8) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000017b, 0x0) 15:25:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:40 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x10000a, 0x0) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000017c, 0x0) 15:25:40 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3ff7f8, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:40 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x100000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:40 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000017d, 0x0) 15:25:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x154, 0x7fffefa5) 15:25:40 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100025, 0x0) 15:25:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000017e, 0x0) 15:25:40 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:41 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x5, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400000022200100000000000040000004000000be2a0bb60cefc2d56147bbfe6aea511d07d4840de689cc879a903c7d6f0149f460829bb471e2127cbef40ee7844d7b078e8aca641feca06efc767ca69546630b03000000000000008c851b8c26eb04aabb5e84fb75430a647e7c9d312e890685764d97c7532e519696"], 0x14}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000100)={0x6, 0x2, 0x800}) flock(r0, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 15:25:41 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3ff800, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000017f, 0x0) 15:25:41 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x10002f, 0x0) 15:25:41 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x155, 0x7fffefa5) 15:25:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000180, 0x0) 15:25:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x10000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x7f, 0x2, 0x0, 0x3d, r0, 0x1}, 0x2c) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000008, 0x7fff, 0x8000000001}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x1d0) mmap(&(0x7f0000f4e000/0x1000)=nil, 0x1000, 0x0, 0x4000011, r1, 0x0) 15:25:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x400000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:41 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x156, 0x7fffefa5) 15:25:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000181, 0x0) 15:25:41 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100030, 0x0) 15:25:41 executing program 4: link(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00'}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850700}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000000440)) pkey_alloc(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x246) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) bind$bt_sco(r2, &(0x7f0000000140)={0x1f, {0x8, 0x4, 0x0, 0x2, 0x7, 0xfffffffffffffff9}}, 0x8) bind$bt_sco(r1, &(0x7f0000000180)={0x1f, {0x80, 0x3, 0x1, 0xd81, 0x7fffffff, 0x789}}, 0x8) close(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0) 15:25:41 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x157, 0x7fffefa5) 15:25:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf83f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000182, 0x0) 15:25:41 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100042, 0x0) 15:25:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000183, 0x0) 15:25:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x158, 0x7fffefa5) 15:25:41 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100060, 0x0) 15:25:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:42 executing program 4: link(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00'}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850700}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000000440)) pkey_alloc(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x246) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) bind$bt_sco(r2, &(0x7f0000000140)={0x1f, {0x8, 0x4, 0x0, 0x2, 0x7, 0xfffffffffffffff9}}, 0x8) bind$bt_sco(r1, &(0x7f0000000180)={0x1f, {0x80, 0x3, 0x1, 0xd81, 0x7fffffff, 0x789}}, 0x8) close(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0) 15:25:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000184, 0x0) 15:25:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000185, 0x0) 15:25:42 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x1000e8, 0x0) 15:25:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x159, 0x7fffefa5) 15:25:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7fff, &(0x7f0000000180)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff0000b408000000fab7711721190000200020d39b1b5f7e00004e5e43246536ca8c250bb300a06b0466ea7c0a72a71edeea68cd3606afca4ce9b26b779aeab4d5b870ec774bac4e52c2826f893640f562a20ed9af2c9b1a56bf5a33ea24f206000000fc81461882be1dde11b546c35b16487cd565af8ea40798ec0ec54db88fdd6f"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280)}], 0x1}, 0x0) 15:25:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000186, 0x0) 15:25:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:42 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x1000e9, 0x0) 15:25:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x711000) 15:25:42 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000}) r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x10001, 0x80) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, r0, 0x58) futex(&(0x7f00000000c0), 0x87, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2001, 0x0) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000100)={0x0, 0x8000005}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) 15:25:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x15a, 0x7fffefa5) 15:25:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000187, 0x0) 15:25:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000010000001}, 0xc) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xa2f}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 15:25:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000188, 0x0) 15:25:42 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x101020, 0x0) 15:25:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:42 executing program 4: personality(0xc50000f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x3) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000180)={0x40, 0x3, 0x3}, 0x10) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000100)={0xffffffff, 0x109, "a14396ef2de8933e23e132fff515c784c600c97b914d4225adcb206c7f7239a9", 0xfffffffffffffffd, 0x9, 0x7, 0x3, 0x2}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x2, 0x70, 0x6, 0x97f, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x38000000000, 0x1c9, 0x8, 0x1, 0x8001, 0x3, 0x7f, 0xfff, 0x26, 0x0, 0x80000000, 0x81, 0x0, 0x20, 0x8, 0xc9fa, 0x2, 0x4, 0xd19, 0x0, 0x40, 0x4, 0x70bfbc5a, 0x0, 0x3, 0x1, 0x6, 0x8, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x2006, 0x6, 0x0, 0x7, 0x7, 0xfff, 0x8001}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000200)={0x49, 0x8, 0x3, 0x0, 0x7, 0x7, 0x10001, 0xce, 0x1, 0x2, 0x7, 0x8000}) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000340)) r3 = pkey_alloc(0x0, 0x3) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000380)=0x9, 0x4) pkey_free(r3) r4 = add_key(&(0x7f0000000300)='lofon\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='keyring\x00', r4) 15:25:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x15b, 0x7fffefa5) 15:25:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000189, 0x0) 15:25:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:42 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000840)=0xe8) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x9, &(0x7f0000000640)=[{&(0x7f0000002040)="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", 0x1000, 0x1}, {&(0x7f0000000200)="572a9e1d698d84756e01d0a92467", 0xe, 0x3}, {&(0x7f0000000240)="681c5355f5db5653c5c6eaa4d6e4487b86b45df1dd9ccef8f9c41ec8eb31ddea85db2c05ea4aed7d770a1b23f55bac202b7b01fed8c618d87922dfc2f48ab2", 0x3f, 0xffffffffffffff1c}, {&(0x7f0000000280)="475a2b4f1c1bd55566044a319e295db7ec3add93f619cf3a94300f46673c9765bd94ae5d520e9dde2f04f84f333f35c90766b769fa1629c8da3ce6891947bf9bce23ad7b45a163431410e7c3bf6a43464a94e54342b231575d2790f0", 0x5c, 0x10000}, {&(0x7f0000000300)="867a85a84bb54fcb12b8a6b2c453585af667c6e506b25ff20548c81e518460108e3677d32f242b90d2cdc6b4d019e4e4960907743ec61b779cc4c8015a66375ad2f810b1c0fb09078f73ebe80267b3282f59a10d399b00af4382e0fe8273d8e3bc0617ec35c0fc992217966b02789d8dd4fe7074beafa2890ad35244d2bebb83f299cbfdd3c6be786d0fadf3881f76e312d4", 0x92, 0xfffffffffffffc01}, {&(0x7f00000003c0)="f3be5f871fa1be7ebd3d36b05eeca35b3ec95390addcb3d3d07cad34325c2ceabd7124", 0x23, 0x7}, {&(0x7f0000000400)="155017b59fce91cf8e162451ab9b0a5697d2f4548e723e16a87736119707a6c95fb647bec3ecee5ce796efdba62253d1f9b01a95a3ff734ed20818201a50e7b4fc13937f97b87de08c", 0x49, 0x3}, {&(0x7f00000004c0)="92e4757f3d277c23235db601480dbd47cec771dfd95b171e9d26791d15d12e5b62e709ece5947369233419b7d7c9910bf2c7280e0ea2f7f4e599fdc3b7f9246d833c97a8769e91edf78d54ef3177987bb7e8b27fe66aa52ef7b67bac5fa932756d020dcc1e1449bd951d64c2222e73e35d82158a2d4f0228204b959bf1dc8e1f7ce8ad7c66d792a688046787426239375d831055ae32cb2e50b2c687bd11d4b3198d0323b38eff14ae9b0b349011c5ad187c2c2b204ab3a8a30196c831fb8a209402cd8ebfbbf2862a3a364fcdac99e31dafaa", 0xd3, 0x400}, {&(0x7f00000005c0)="c8548bb9f1682fa4061e183d79026b4442ab6d856f220ed281dddd0644ecd753b54b5f2e1c38aaf93d2b67db339be195fa3c594506d11a3e86a3dfe51d3a867fdc85f3476016860caefc0892633e8abd3126b9f21acc2a5036797ab6acd5657015fe59825e09d0a8d9", 0x69, 0xff}], 0x825042, &(0x7f0000000880)={[{@block={'block', 0x3d, 0x800}}, {@check_relaxed='check=relaxed'}], [{@context={'context', 0x3d, 'staff_u'}}, {@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', r2}}]}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) readv(r1, &(0x7f0000000140)=[{0x0, 0x18a}, {&(0x7f0000000480)=""/42, 0xfffffffffffffff7}], 0x3b) fallocate(r3, 0x0, 0x0, 0x10000101) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x34c) 15:25:42 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x10ffe8, 0x0) 15:25:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000018a, 0x0) 15:25:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x15c, 0x7fffefa5) 15:25:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x5000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000018b, 0x0) 15:25:43 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x10ffe9, 0x0) 15:25:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x15d, 0x7fffefa5) 15:25:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x80086601, 0x711000) 15:25:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000018c, 0x0) 15:25:43 executing program 4: syz_emit_ethernet(0x5b, &(0x7f00000000c0)={@local, @broadcast, [], {@generic={0x9100, "b2d797270b5c9965693e45ceb75d09947bfd3ae6a005f15331a5a3120db8de74f2d1d04c3ba59a8fb6069da1839a7ca94fc06836234f7f6ff2096e2c959a62c604c2489801117a8248da696a3c"}}}, &(0x7f0000000040)={0x4, 0x3, [0x0, 0x0, 0x717]}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x12480, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000200)=0x1000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'veth0_to_bridge\x00', &(0x7f0000000140)=@ethtool_rx_ntuple={0x35, {0x1d, @esp_ip4_spec={@loopback, @multicast2, 0x1, 0x9}, @hdata="0493f117fb26a9b1c4ba885c544b1e87834e52fda8d44af99c59ef29531a30e085f7b2a33562cd4faac84dbec4f580c0fcb35696f189686056be59563e364be462d64158ae143265", 0x6, 0x2, 0x8, 0xfffffffffffffd8f, 0xfffffffffffffffe}}}) 15:25:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x80086601, 0x711000) 15:25:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x15e, 0x7fffefa5) 15:25:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x80086601, 0x711000) 15:25:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000018d, 0x0) 15:25:43 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x8100, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000200)={0x1f, 0x8e, &(0x7f0000001440)="8a34bf251796d2e206b70cdf95049fb5918c05aa4606ce4901ccc3df25fc453b51adc1da741b25d7a25be113aabed133f4e95787bd63b78eef36fa12e5ef873d6f2d1cda8420590f936227b3e44ddba70d56b11e386b32529bed190de44430153703d0cf02273ce2c5a0017af21369260d8b1405f99af307446289c9e1051d8e26d99720f27c870ce3e095046efa"}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000001c0)=0xe8) r2 = getgid() ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000001500)=""/187) mount$fuse(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='fuse\x00', 0x8, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@dont_hash='dont_hash'}, {@audit='audit'}, {@audit='audit'}]}}) setsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f0000000440)="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", 0x1000) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:43 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffd39}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00\xba\xa7LD\xfd-3%\xd9N(\x04:f$\xef*\xa5\xb1iP\xd2\'\xdbO\xf1\x1bY\xe1\a\x02\xff\xa9\xc9\xc4\xe1PM\xedAv\xe5\xfd>\x0f\x80\x00\x00\x00M\b\xc0qYG\xdf\x04\x7f\xef\x86\xc3N{W\x89\x87)<\x00\xdb\xa7\x8f\x96\'F\x9ab\xf1wMaA\x1e\xc5nx\xa5\xfc\xfb\x84\xdch\x12\xce5\xea\x90Q\xb8\x03e4\x96\xa0\xff\x91LD\x04\xe7\x8c?\xe7\xees\xdc\xa7n\xefl\xc7\xf5\xb1=\xbd\xeb\x1c\xea))\xb1\xcd\b\xaa\xddNh\xb8\xe7N\x15\'\xa6a\xe6\xc7O\x10\xca\xab\xe3\x93\x99\xf3\xdc\xb0\xa0\xbdG.Dlr\n\xa6\x81\xf3e~\xb9\x1a\xaf\x02\xe9') preadv(r1, &(0x7f00000016c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/82, 0x52}, {&(0x7f0000001240)=""/146, 0x92}, {&(0x7f0000001300)=""/199, 0xc7}, {&(0x7f0000001480)=""/80, 0x50}, {&(0x7f0000001500)=""/125, 0x7d}, {&(0x7f0000001740)=""/72, 0x48}, {&(0x7f0000001600)=""/188, 0xbc}], 0x8, 0x12) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0xffff, 0x46}]}, 0xc, 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x7) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000001580)={0x0, 0x2, 0x10001, 0x10000, 0x10000, 0x9}, &(0x7f00000015c0)=0x14) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000001800)={r1, 0x2, 0x1ff, "07e603"}) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000017c0)={r3, 0x1f}, 0x8) [ 674.629710] EXT4-fs: 28 callbacks suppressed [ 674.629722] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x0) 15:25:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x15f, 0x7fffefa5) 15:25:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000018e, 0x0) [ 674.714937] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 674.734316] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 674.788565] QAT: Invalid ioctl [ 674.788792] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 674.810637] QAT: Invalid ioctl 15:25:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x0) 15:25:43 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x0) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3, &(0x7f00000000c0)=0x100000000000001, 0x43, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2) get_mempolicy(&(0x7f0000000000), &(0x7f00000001c0), 0x1ff, &(0x7f0000fff000/0x1000)=nil, 0x3) 15:25:43 executing program 3: mkdir(&(0x7f0000000080)='./file0/../file0\x00', 0x1) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) socket$inet6_udplite(0xa, 0x2, 0x88) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="00fbef001f0c0224430cd178fed3b140a9b6150898d151501f6c2d788ea2b28d7a59502c08402842d4f53b492ff019c1cfdff6d65a45e79e3f105257fd5c521e6f255f44d968479fd8bc45c219ef740b1fdf849c3a90ae2ba5fc9c4eb6800a5a93df4465be6eb7d31bfdf91d3806e605724eafdbf754a7ce346151573431d53a071b60f9495f775dd0b98449fa6f33f057e70be7a0ec8ff81b99f945a03ce7d0d8239164360a8b5eec46cb00a62d650d10af6ec593d053d361c89f5705cc6dcb874c332cbd9212c0fe8d429fe98e3534ba6dd25a60fdc038e4e69d1591dccf9e26d3f8a1ec2e4521fef6e600000000"], 0xef, 0x1) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000001c0)={0x0, 0x3}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000018f, 0x0) 15:25:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x160, 0x7fffefa5) 15:25:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x0) 15:25:44 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x208000, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000040)={0x73, "fb1aa25504bef146f764e7663d928fdf14879eac177865aca32a89c744f6e023", 0x2, 0x7, 0x9f, 0x1b70b, 0xe}) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r1, &(0x7f00000003c0)="8472e79f3703cb06a37a3e0f8012", 0xe, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x2400, 0x171) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 15:25:44 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:44 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x10140) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x80, 0x80800) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000400)=r1) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400200, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}}, 0x8, 0x9, 0x1000, 0xfffffffffffffc00, 0xed72}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={r3, @in={{0x2, 0x4e22, @rand_addr=0x1}}, 0x4, 0xe2, 0x35c, 0x2, 0x3}, &(0x7f00000000c0)=0x98) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 675.061654] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000190, 0x0) [ 675.146692] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086601, 0x711000) 15:25:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x10000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x161, 0x7fffefa5) [ 675.243659] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000191, 0x0) 15:25:44 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e21, 0x84d, @rand_addr="4993acf180ef3dbff1ca7daa954bcae5", 0x6}, {0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0x81, [0x8000000, 0x4, 0x7ff, 0xff, 0x8, 0x1ff, 0x7f8000000, 0xffffffff]}, 0x5c) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f00000001c0)={0x80, 0x20100000, 0xffffffffffffffff, 0x9, 0x3d798000000000, 0x1, 0x4, 0x2, 0x5c, 0xfffffffffffffffb}, 0x10) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="af000000e5e1bb7b8f8c38f1a7ec423d32e784d5913e0704fb62e46d40279e1304650e47a2e3440f5dea727ad62a56c54943e991884a7dab59977d0b2d68d0abdfa845898701112187a9bc81227e1dd3fb09f05e72bf0bfe6117d938c62ee0c15b5c86c5ab4f11022914cb79935a394517e86415ce5fdfefb9b7da33035601605e0020f00f3143116436aeacb999d7b82aeb6b9da4dee9a9011959e54391932692b752a761b7668cc13157a1c3df33669ab462"], &(0x7f0000000280)=0xb7) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r3, 0x4}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)=')}\xa1\xa2\v/dev/au') dup2(r4, r0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 15:25:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x2, 0x711000) [ 675.423146] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000192, 0x0) [ 675.464711] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x162, 0x7fffefa5) 15:25:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x541b, 0x711000) [ 675.568577] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000193, 0x0) 15:25:44 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x800, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x5421, 0x711000) 15:25:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1a0f0000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x163, 0x7fffefa5) 15:25:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000194, 0x0) 15:25:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r1, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000adb000)="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", 0x599, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) faccessat(r2, &(0x7f0000000180)='./file0\x00', 0x42, 0x400) r3 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x8) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000080)) recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="49e62450ea5fc076c51448a240dfc717"}, 0x709000) 15:25:44 executing program 3: userfaultfd(0x80800) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) llistxattr(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000001c0)=""/80, 0x50) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x5450, 0x711000) 15:25:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000195, 0x0) 15:25:44 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x610880, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000013c0)=""/4096, 0x1000) r2 = accept$alg(r0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$CAPI_INSTALLED(r3, 0x80024322) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f0000000040)={0x3, 0x1c, [0xddc, 0x8, 0x40, 0x2, 0x101, 0x3, 0x9398]}) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 15:25:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x5451, 0x711000) 15:25:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x1f000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000196, 0x0) 15:25:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x164, 0x7fffefa5) 15:25:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x5452, 0x711000) 15:25:45 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x610880, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000013c0)=""/4096, 0x1000) r2 = accept$alg(r0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$CAPI_INSTALLED(r3, 0x80024322) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f0000000040)={0x3, 0x1c, [0xddc, 0x8, 0x40, 0x2, 0x101, 0x3, 0x9398]}) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 15:25:45 executing program 3: mkdir(&(0x7f0000000280)='./file0/../file0\x00', 0x1) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x41, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f00000000c0)='e\x8at4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) 15:25:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000197, 0x0) 15:25:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x5460, 0x711000) 15:25:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x165, 0x7fffefa5) 15:25:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x20000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6609, 0x711000) 15:25:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000198, 0x0) 15:25:45 executing program 3: mkdir(&(0x7f0000000040)='./file0/../file0\x00', 0x7) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffff6b, 0x0, 0x100020, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x2000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000080)=',cpuset.\x00'}, 0x30) fcntl$setown(r0, 0x8, r1) 15:25:45 executing program 4: socket$l2tp(0x18, 0x1, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2a) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x10000000800002c0, 0x40000001]}) 15:25:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x711000) 15:25:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000199, 0x0) 15:25:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x166, 0x7fffefa5) 15:25:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x2d000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000019a, 0x0) 15:25:45 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair(0xa, 0xb, 0x7, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x100020, 0x0) 15:25:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x711000) 15:25:45 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000000c0)="23000000660007031dfffd946fa2830031200a00ffffffffa61d85680c1ba3a20400ff", 0x23}], 0x1}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x2b0400) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x27c, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x12c, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x668}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2a2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffb5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x33eb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9d64}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x21eb2164}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd9a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xf556, @loopback, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xae}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4, @loopback, 0x100000001}}}}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x27c}, 0x1, 0x0, 0x0, 0x4044840}, 0x0) 15:25:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6612, 0x711000) 15:25:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x167, 0x7fffefa5) 15:25:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x3f000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000019b, 0x0) 15:25:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r2, 0xab1, 0x30}, &(0x7f0000000140)=0xc) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x220, 0x0, 0x0, 0x10000007a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000340)={0x20000000007b, 0x0, [0x200000488]}) 15:25:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40049409, 0x711000) 15:25:45 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e20, @rand_addr=0x8}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @rand_addr=0x8}, 0x220, 0x0, 0x0, 0x0, 0xd5, &(0x7f00000000c0)='bridge_slave_1\x00', 0x1, 0x90000000000000, 0xfffffffffffffffc}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000019c, 0x0) 15:25:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x711000) 15:25:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x168, 0x7fffefa5) 15:25:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000006c0)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000a00)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) ioctl$TIOCGETD(r5, 0x5424, &(0x7f00000002c0)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)={0x2a, 0x4, 0x0, {0x1, 0xbe, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000ac0)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e601019df973b53d859e769460fe2a2410d59da456ae82f2f55c73123c2dbce75b70cb2f7e97dd3564e92440b2b803e662742b0427c4f3eb4576e7f2fe26ecc08397d62d1d30b927d145e5cb7737f20a52df30951cba92bfb856f22eded3b7f50d288ae4faa1990c470fc25ffcf8e94fd98848b82450e0e8e3135bcba4bf8782985940f6c944606b98648843cb7b60d98f2f543ec72b7cb2773183e60b65c0df1afc6b63367682468cdaf6185ef00b67e70266796ad978a53ad9635"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="bb4bb74110f7798a4cc9e3636ad7d4f7fbeaf5bce3c1f26fad6d63f5e11e019a65ba51d7d6512f9f136c372e82d54b16000000004c6689e9e2c307d217dfb65a7be22995e60e9ebd539f8d3bb6b15cf844c9817dc5e3d021e4cf299576566f50034fde34686a12312a0c07"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) dup2(r3, r2) ioctl$TCSBRKP(r5, 0x5425, 0x5) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='./file0\x00') preadv(r3, &(0x7f0000000600)=[{&(0x7f0000000740)=""/193, 0xc1}, {&(0x7f0000000540)=""/33, 0x21}, {&(0x7f0000000840)=""/181, 0xb5}, {&(0x7f00000005c0)=""/15, 0xf}], 0x4, 0x5) ioctl$int_out(r5, 0x2, &(0x7f0000000380)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000440)) 15:25:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000019d, 0x0) 15:25:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x40000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086604, 0x711000) 15:25:46 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) name_to_handle_at(r0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000280)={0x102, 0x2, "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"}, &(0x7f00000000c0), 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000019e, 0x0) 15:25:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086607, 0x711000) 15:25:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x169, 0x7fffefa5) 15:25:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x48000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) [ 677.668254] EXT4-fs warning (device sda1): ext4_group_extend:1785: will only finish group (524288 blocks, 256 new) 15:25:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x100000000000019f, 0x0) 15:25:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x16a, 0x7fffefa5) [ 677.754611] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted 15:25:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086610, 0x711000) [ 677.949271] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted 15:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a0, 0x0) 15:25:47 executing program 3: lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff8, 0x200) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000180)=""/143) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10402, 0x0) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x800, 0x2, 0x9, &(0x7f0000ffa000/0x2000)=nil, 0x6ec0511d}) 15:25:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x4c000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x16b, 0x7fffefa5) 15:25:47 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x48000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40087602, 0x711000) 15:25:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x400c6615, 0x711000) 15:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a1, 0x0) 15:25:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40106614, 0x711000) 15:25:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x16c, 0x7fffefa5) 15:25:47 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x200000003) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a2, 0x0) 15:25:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x401c5820, 0x711000) 15:25:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x68000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:47 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x48000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x16d, 0x7fffefa5) 15:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a3, 0x0) 15:25:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4020940d, 0x711000) 15:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a4, 0x0) 15:25:47 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) splice(r0, &(0x7f0000000040), r1, &(0x7f00000000c0), 0x5, 0x3) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40286608, 0x711000) 15:25:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x6c000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x16e, 0x7fffefa5) 15:25:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xc) setsockopt$inet6_int(r3, 0x29, 0xcb, &(0x7f0000000140), 0x4) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f00000000c0)={0x100000, 0x1000, 0x3ff, 0x2b, 0x1}) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000100)=@bcast) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0xae34, 0x100000000, 0x240, 0x3f, 0x3}) open_by_handle_at(r1, &(0x7f0000000180)={0xda, 0x7, "25a8477c3fc1a471663734c950d9eb3d3d7de382a4e05baeebf7b82c086f0f8c0761089e13fd5855ef0b9fe5f6e33ada818b2bbdd9e2c918d74f94eff92f33397ac349c7f1aa0a1a76229b779f532053491bce64d5aa380741c73cfb933d93aa9856bd5bbe786c4432410611fc89710571ea435105710dd852b1476b79adbdf0a21225883fa0af3e68a012bad299cde281163abc443feda732187f2b815ba4be8d1e635ae05f189cff540293abcda8d6efb592f94543d29f86d5d1f5320edad535e23acbab04dc20965c5b0aac62ce15f8f4"}, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) [ 678.902755] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 7409824 (only 16 groups) 15:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a5, 0x0) 15:25:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40305828, 0x711000) 15:25:48 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000140)=0xfffff7fffffffffd, 0x4) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@local, @local, 0x1, 0x1, [@empty]}, 0x14) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x80000000002, &(0x7f0000000340)=0x5, 0x4) bind$inet(r1, &(0x7f0000e15000)={0x2, 0x4e20, @multicast2}, 0x10) r3 = socket$nl_generic(0xa, 0x2, 0x11) r4 = socket$nl_generic(0xa, 0x2, 0x11) sendmsg$nl_generic(r4, &(0x7f0000004fc8)={&(0x7f0000001ff4)={0x2, 0x2}, 0x12dd0582, &(0x7f0000001000)={&(0x7f0000000fd8)={0x4}, 0x14}}, 0x8000) sendmsg$nl_generic(r4, &(0x7f0000007000)={&(0x7f0000004ff4), 0xc, &(0x7f0000004ff0)={&(0x7f0000007fec)={0x14}, 0x14}}, 0x8800) sendmsg$nl_generic(r4, &(0x7f0000004fc8)={&(0x7f0000001ff4)={0x2, 0x2, 0x0, 0x2}, 0xc, &(0x7f0000001000)={&(0x7f0000000fd8)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$nl_generic(r3, &(0x7f0000005000)={&(0x7f0000004ff4), 0xc, &(0x7f0000004ff0)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1}}, 0x0) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000361000000000000000000000000000000000000000009500000000000000000000000000000000000000000000000000000000000000"], 0x78) listen(r2, 0x0) 15:25:48 executing program 3: mkdir(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x40, 0x4) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x1) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a6, 0x0) 15:25:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x74000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x16f, 0x7fffefa5) 15:25:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4030582a, 0x711000) 15:25:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PPPIOCDISCONN(r2, 0x7439) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f00000017c0), 0x1d0, 0x6c00) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000180)="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") 15:25:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6609, 0x711000) 15:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a7, 0x0) 15:25:48 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$bt_hci(r0, &(0x7f00000002c0)={0x1f, r1, 0x4000002}, 0xfffffffffffffd0c) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000300)) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000280)) setpgid(r2, r3) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x10000) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a8, 0x0) 15:25:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086602, 0x711000) 15:25:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x7a000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x170, 0x7fffefa5) 15:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001a9, 0x0) 15:25:48 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080), 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 679.636283] EXT4-fs: 28 callbacks suppressed [ 679.637744] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80086603, 0x711000) 15:25:48 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r1 = semget(0x0, 0x4, 0x4a1) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r2, 0x0, 0x8000fffffffe) sendfile(r0, r2, 0x0, 0xa5cc54d) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000069e64840190f87cd158b4915eec2f685edbe05bd84e87d5386cdf7e5a43f18633295f355a133bcb6a9cf75db181abf2e585047e9d435211737a1abbe0ea8a76be1a70c89d3b68567eb"], &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r3, 0x7, 0x30}, &(0x7f0000000100)=0xc) delete_module(&(0x7f0000000000)='@\x00', 0x800) [ 679.714121] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 679.740733] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x171, 0x7fffefa5) 15:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001aa, 0x0) 15:25:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x8cffffff, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x80087601, 0x711000) [ 679.828075] audit: type=1804 audit(1548257148.783:57): pid=22482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080376465/syzkaller.JDRd8k/588/bus" dev="sda1" ino=16913 res=1 15:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ab, 0x0) 15:25:48 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) [ 679.942059] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x800c6613, 0x711000) [ 680.021145] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x172, 0x7fffefa5) 15:25:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ac, 0x0) 15:25:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xc0000000, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:49 executing program 3: mkdir(&(0x7f0000000900)='./file0/../file0\x00', 0x314a99b50dd34bdf) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = getuid() r4 = getuid() r5 = geteuid() r6 = getuid() r7 = geteuid() mount$9p_virtio(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2000, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=virtio,uname=ext4\x00,access=', @ANYRESDEC=r0, @ANYBLOB=',debug=0x0000000000000005,debug=0x000000000000ffff,dfltuid=', @ANYRESHEX=r1, @ANYBLOB=',version=9p2000.u,dfltgid=', @ANYRESHEX=r2, @ANYBLOB=',access=', @ANYRESDEC=r3, @ANYBLOB="8362704fd1b361fba05a9ad8c310d3df12c4405c5603f6ce5401fffe286179fe6e1e7d0c702b8fd9231335ed4ff9f2bde6e2ae8989219980cd6654f28579c1f38b045d63708c791487406524f5", @ANYRESDEC=r4, @ANYBLOB=',cache=loose,smackfsroot=ppp0!GPL,fsname=ext4\x00,obj_role=md5sum}{#vmnet0mime_type\'\',appraise,fowner<', @ANYRESDEC=r5, @ANYBLOB=',obj_user=+Oem0$-^,dont_hash,uid>', @ANYRESDEC=r6, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',context=staff_u,\x00']) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) pipe2(&(0x7f0000000580)={0xffffffffffffffff}, 0x800) fallocate(r8, 0x0, 0x101, 0x1076da3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(r8, 0xae04) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x103200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000004c0)={0x0, 0x0, 0x30}, &(0x7f0000000500)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r9, 0x84, 0x22, &(0x7f0000000540)={0x4, 0x4, 0x3ff, 0x9, r10}, 0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f00000005c0)={r10, 0x4, 0x7fb, 0x3, 0xfffffffffffffffb, 0x1}, 0x14) ioctl$sock_ax25_SIOCADDRT(r9, 0x890b, &(0x7f0000000600)={@null, @bcast, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) [ 680.359676] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 680.418951] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 680.626672] audit: type=1804 audit(1548257149.583:58): pid=22495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080376465/syzkaller.JDRd8k/588/bus" dev="sda1" ino=16913 res=1 [ 680.663666] audit: type=1804 audit(1548257149.623:59): pid=22491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080376465/syzkaller.JDRd8k/588/bus" dev="sda1" ino=16913 res=1 15:25:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x75, 0x0, 0x0, 0x169) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7c, 0x0, [0x40000000, 0x80010001, 0x40000001, 0x3]}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000100)) 15:25:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf5ffffff, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ad, 0x0) 15:25:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x801c581f, 0x711000) 15:25:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x173, 0x7fffefa5) 15:25:49 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0xffffffffffffffdd, 0x1) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0045878, 0x711000) [ 680.797906] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 680.831923] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 15:25:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ae, 0x0) 15:25:49 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet(0x2, 0x806, 0x10000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='scalable\x00', 0x9) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 680.922771] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 680.968745] Unknown ioctl 35298 15:25:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0045878, 0x711000) 15:25:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf6ffffff, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x174, 0x7fffefa5) [ 681.100348] Unknown ioctl 35298 15:25:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001af, 0x0) 15:25:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x711000) 15:25:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x17, 0x5}], 0x18) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r1 = gettid() ptrace$peek(0x1, r1, &(0x7f0000000440)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x4000000011) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@loopback, @in=@initdev}}, {{@in6=@local}}}, &(0x7f0000000580)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="a2c0e8cf543dffff0008170b001afa2da872b86609ca557ef8ae9a6b5c000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380)={0x1f, 0xce, 0x7, 0x6, 0x8, 0x7, 0x7fffffff, 0x7fff}, &(0x7f00000003c0)={0x4, 0x17, 0xffffffffffffff7d, 0x80000000, 0xa8bc, 0x6, 0xfffffffffffffffa, 0x401}, &(0x7f0000000400)={0x8, 0x0, 0x3, 0x6, 0x0, 0x10001, 0x8, 0xffffffff80000000}, 0x0, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f00000002c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000680)=""/153, 0x99, 0x40000000, &(0x7f0000000740)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x40}}, 0x24) 15:25:50 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000900)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xcb, 0x8, &(0x7f0000000840)=[{&(0x7f0000000280)="6e3da2db0b23f3c9e743e98d7f8d35460f5452bb48f0336918ccf6de80751583e986bfca98de48837389ea7f8da91885d26e8e571efc705b62d31e57e49b18f2a0fddbc9ef4081d41c16663c00cba498ed12929153d350a07eb9e56da7d004148afaf8e628a54440b8ced87e000362696a255f1d8465d953158d5ac67f5e6fbae922f7698f3fc4f750344c2ecd6f30aff9187a7190fc2651c4d25aa851a7c9f77078817ad405a11814206297b817fe821c2925031d64866a17b95cffbc17", 0xbe, 0x8000}, {&(0x7f0000000340)="41d355b41b65c195c40ec3e7e3cede273c1d5a6e5c87f3be025966aa199c374dde67bf817de55adbabe2d9b7890a7816b518e17ba4e57371f97c04b159f136f603c94e6e4049f21ae4e264f2bd32a0dd3619d47973adda74fc696f3a5f23f4b2009cd63e6df9ef71adb9ccb1a29441b0d7543dd3fd5433c8dfc241a5e5e208ccdd3718d0e65185da8b33edcdf1578ce97650dc2e0345479517448c765a65b7eb956f154033cc8eae39f8925d77f6bb3706ec4e3a2d3665a6d8e1e6f884412afdb26e0e5c5be010328fd4415808d95773b3534e78826dc2c4fd1c4d9f52e14bfbfd992234b18312ba7ab59cc2b91d0c081df69dd1fa96", 0xf6, 0x3}, {&(0x7f0000000440)="ce4c82bf22eb8de21f4af87728521af49428ff592e6ce96996f7a15f6e206c59dbc009ef0fabcc864d372969362309c9e5135d565e55dc7d91bcda819d3f80c1b490039e12515698e4034631f69e4608edc2bb7a0483b88e7c73281abbf353bd202e60e1a17f8d1831b035b245090d028e844f015568e1753670e4fb6b511943d39bd008315ea27908f9bd47175a3f50d7886eaabffe4d3ac0d14449c9d5c8d8144b", 0xa2, 0x401}, {&(0x7f0000000500)="a56c9648be4a9921046165f4c0a8e21197c0b85cf5563e3fab90d6cec7d74fea7946703e1680b28660868d6641f7f803d28caf0a47485b2c90caba8a784e115ab10fafdff32632eb79b77e90db8187274475ae83eb5e614dc1ecce1bd2fdf8e86f409e842a08a89f974d7db10c408f04e2991fbca934581f508d7b9bb7d8c7a79b78e891fd560111cec16a531d", 0x8d, 0x9}, {&(0x7f00000005c0)="ddce872b7277c0ec9594903ff6aac3429e263afb1a586e5112b01ca165859fd05709e3048ed0b89f1e50123737dea3d6219c486b7e3c0fdb140cf0b38f19ef22a939dc63b6c1d7e6c7d0111cc6d523db24bbea51e8eaac0287ec79f33a4bc9b33187cd8b38f82d3f972cdab526aebc92fb78f18170a433ad17880578f715a6f66cb3fd99beda9fd3eeb01a8fcb64715bf137061693e863d322fb9f2eadbb", 0x9e, 0x2}, {&(0x7f0000000680)="795673b7c7d28436c05aa062d431d17c6df8bed0c0e3299f3e860944ab12c75a8ff8b15d6a30c11fd6d2257aa69668390f26fb5237a4d0c9553823c655055a0ea6aad9921d721ed823f1279601a80b739e06fe08799cc4c4e8173a724851ffaaf1f51bd730e891e437a571bbe9d7a5221048ba831398ab7e5e506511eba8fa1e05e550715ca993cab8a094647f093c32fbb9223616f171a5574bfcb1e1a5377b290896294c365ae9b222b908bc9732c10c9e547784aa93ba0655e48fb5", 0xbd, 0x7}, {&(0x7f0000000740)="8b33abe9d991d1a0f342488fbbb1bcbb0b55f5711a017ab32ad9d322ef324cdec8bdb8bd0022a884f103feef27bc150a5e9416fb1d7eb42e8d070f47f28bdddc1cb9e74607fa3d2da98df74fbcc79134890b1c4d0c8932b4ad2a028bb5d7a54f4b4e889635874453decd1628c084b859407cc881d832c87cb8e641f810deeed2a2221d1739934ea479db65e19c0cebd08a2045ab882e3970f12d38d52e297f4c1ad34ed473c70a60a433cab72881d09d5f572c0693bb90cf1d369991f12b1bb87cfb07eb1de27a6db98a40479bb7f29100618b2ce9744ac8bc9f5acaae9670fafdbd8cea8de848", 0xe7, 0x8}, {&(0x7f00000001c0)="26c43f7cd13ca150ff8890e809a981f933e808c3a13e7d48f40ac9b1dae1d18b53f6032c983189a9e9db83f8d118485bcf0cce428cd314f02316fb95570f32cb4758ce7b4cd1ad23cbe26054b9c0c60d83e51c7a5beb1ff8a27019def0faf4f413c9550ff43310ba2cc5fb35c5ef7cfc5ebd0e3e32ca0a9f84aba62f9b", 0x7d, 0xfff}], 0x8020, &(0x7f0000000b40)=ANY=[@ANYBLOB='data_err=ignore,debug_want_extra_isize=0x0000000000001000,max_dir_size_kb=0x0000000000000002,obj_user=&,uid<', @ANYRESDEC=r0, @ANYBLOB="2c6d6173643e00000000f5ffffff370f000000", @ANYRESDEC=r1, @ANYBLOB="000000c4fcffff7fffffff4b70c713f8d0ac9fea97c2817501c85b90a4b39d65ed015556acd16108e1120ce95f360a19f23c7c4781b342ff8ee259dfb2c3cfe0c722fcaf9f96f751d11d0d68e4c02acdd26a91e5fd40e8e31e11a204bc32108018c8f4948f2865fff3662c87799316c65e1b850790af3461"]) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 15:25:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x175, 0x7fffefa5) 15:25:50 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xf8f73f00, 0x0, &(0x7f0000000800), 0x100020, &(0x7f00000000c0)) 15:25:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001b0, 0x0) 15:25:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0189436, 0x711000) [ 681.419333] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #17340: comm syz-executor2: corrupted xattr entries 15:25:50 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x400) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000, 0xffffffffffffff9c}) r2 = socket$inet_dccp(0x2, 0x6, 0x0) dup3(r2, r1, 0x80000) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="00fbca0400b2addd9ed1fd8acb65aaa762b107931639c01ca35917d7d341bc5efae85956a6c9444ebebf5d648e38dd3d38a54e5f7d733c458eb8daa8149fcfeb8289944fde6834000195a25036a135ee1da77e8087a6bf20757a64fef187e522abd9f536f3dd45d53049cac2dd5782fc78a99d41224ff8babde696f43d0c2900c46e6bc67c90f78d0b60c903152c978c2891e7be9eb4aed9d8f4c372e22920f9c7fb450ef5f843889f5fe20950126af30b6b97b9b4fd112bc3e0c51be5c9083e8ad86343658fa38a2a76"], 0xca, 0x1) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 681.509827] ================================================================== [ 681.517528] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16c/0x240 [ 681.524981] Write of size 4064 at addr ffff888079ed31a0 by task syz-executor3/8078 [ 681.532679] [ 681.534314] CPU: 1 PID: 8078 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #40 [ 681.541413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.550773] Call Trace: [ 681.553370] dump_stack+0x1db/0x2d0 [ 681.557007] ? dump_stack_print_info.cold+0x20/0x20 [ 681.562048] ? ext4_mark_inode_dirty+0x781/0xb80 [ 681.566812] ? __ext4_expand_extra_isize+0x16c/0x240 [ 681.571928] print_address_description.cold+0x7c/0x20d [ 681.577215] ? __ext4_expand_extra_isize+0x16c/0x240 [ 681.582331] ? __ext4_expand_extra_isize+0x16c/0x240 [ 681.587439] kasan_report.cold+0x1b/0x40 [ 681.591512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 681.596635] check_memory_region+0x123/0x190 [ 681.601057] memset+0x24/0x40 [ 681.604170] __ext4_expand_extra_isize+0x16c/0x240 [ 681.609113] ext4_mark_inode_dirty+0x827/0xb80 [ 681.613710] ? ext4_expand_extra_isize+0x5c0/0x5c0 [ 681.618658] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.624199] ? __ext4_journal_start_sb+0x1af/0x630 [ 681.629134] ? check_preemption_disabled+0x48/0x290 [ 681.634163] ? ext4_journal_abort_handle.isra.0+0x260/0x260 [ 681.639891] ext4_dirty_inode+0x8f/0xc0 [ 681.643876] ? ext4_setattr+0x25c0/0x25c0 [ 681.648031] __mark_inode_dirty+0xab5/0x1590 [ 681.652497] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 681.657692] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 681.662893] ? __inode_attach_wb+0x1380/0x1380 [ 681.667483] ? trace_hardirqs_on+0xbd/0x310 [ 681.671809] ? ktime_get_coarse_real_ts64+0x24c/0x3b0 [ 681.677003] ? current_time+0x6e/0x1b0 [ 681.680900] ? trace_hardirqs_off_caller+0x300/0x300 [ 681.686011] ? inode_init_owner+0x340/0x340 [ 681.690340] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 681.695362] ? ktime_get_coarse_real_ts64+0x24c/0x3b0 [ 681.700557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.706098] ? timespec64_trunc+0xf0/0x180 [ 681.710342] ? inode_init_owner+0x340/0x340 [ 681.714672] ? lock_release+0xc40/0xc40 [ 681.718656] generic_update_time+0x268/0x440 [ 681.723073] ? file_remove_privs+0x500/0x500 [ 681.727489] ? timespec64_trunc+0x180/0x180 [ 681.731823] ? __sb_start_write+0x1ac/0x360 [ 681.736155] touch_atime+0x2a4/0x320 [ 681.739871] ? file_remove_privs+0x500/0x500 [ 681.744281] ? file_remove_privs+0x500/0x500 [ 681.748692] ? atime_needs_update+0x710/0x710 [ 681.753195] ? __down_interruptible+0x740/0x740 [ 681.757875] ? mntget+0x41/0x50 [ 681.761165] trailing_symlink+0x2d4/0x970 [ 681.765335] path_mountpoint+0x9ee/0x21a0 [ 681.769489] ? kasan_slab_alloc+0xf/0x20 [ 681.773554] ? kmem_cache_alloc+0x12d/0x710 [ 681.777879] ? getname_flags+0xd6/0x5b0 [ 681.781855] ? user_path_mountpoint_at+0x29/0x50 [ 681.786627] ? ksys_umount+0x198/0x1340 [ 681.790606] ? __x64_sys_umount+0x54/0x80 [ 681.794778] ? do_syscall_64+0x1a3/0x800 [ 681.798872] ? path_openat+0x5650/0x5650 [ 681.802938] ? check_stack_object+0x114/0x160 [ 681.807439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.812980] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.818529] ? __phys_addr_symbol+0x30/0x70 [ 681.823032] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 681.828058] ? __check_object_size+0xa3/0x790 [ 681.832568] filename_mountpoint+0x258/0x490 [ 681.836986] ? user_path_at_empty+0x50/0x50 [ 681.841335] ? digsig_verify.cold+0x32/0x32 [ 681.845684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.851230] ? getname_flags+0x277/0x5b0 [ 681.855302] user_path_mountpoint_at+0x3a/0x50 [ 681.859894] ksys_umount+0x198/0x1340 [ 681.863703] ? putname+0xef/0x130 [ 681.867166] ? rcu_read_lock_sched_held+0x110/0x130 [ 681.872187] ? kmem_cache_free+0x225/0x260 [ 681.876431] ? putname+0xf4/0x130 [ 681.879895] ? __detach_mounts+0x4d0/0x4d0 [ 681.884135] ? do_unlinkat+0x21a/0x9e0 [ 681.888051] ? do_syscall_64+0x8c/0x800 [ 681.892029] ? do_syscall_64+0x8c/0x800 [ 681.896016] ? lockdep_hardirqs_on+0x415/0x5d0 [ 681.900614] ? trace_hardirqs_on+0xbd/0x310 [ 681.904948] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.910320] ? trace_hardirqs_off_caller+0x300/0x300 [ 681.915428] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.920204] __x64_sys_umount+0x54/0x80 [ 681.924187] do_syscall_64+0x1a3/0x800 [ 681.928085] ? syscall_return_slowpath+0x5f0/0x5f0 [ 681.933024] ? prepare_exit_to_usermode+0x232/0x3b0 [ 681.938053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 681.942912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.948110] RIP: 0033:0x45aae7 [ 681.951307] Code: 44 00 00 b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.970209] RSP: 002b:00007ffc8e714918 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 681.977919] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045aae7 [ 681.985187] RDX: 0000000000402eb0 RSI: 0000000000000002 RDI: 00007ffc8e7149c0 [ 681.992456] RBP: 000000000000060a R08: 0000000000000000 R09: 0000000000000010 [ 681.999726] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffc8e715a50 [ 682.007002] R13: 00000000015fd940 R14: 0000000000000000 R15: 0000000000000003 [ 682.014288] [ 682.015913] The buggy address belongs to the page: [ 682.020846] page:ffffea0001e7b4c0 count:2 mapcount:0 mapping:ffff88821a181518 index:0x447 [ 682.029249] def_blk_aops [ 682.029260] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 682.038940] raw: 01fffc000000203a ffffea000203adc8 ffffea00020a2208 ffff88821a181518 [ 682.046828] raw: 0000000000000447 ffff88808d296888 00000002ffffffff ffff8880860e2d00 [ 682.054703] page dumped because: kasan: bad access detected [ 682.060412] page->mem_cgroup:ffff8880860e2d00 [ 682.064899] [ 682.066519] Memory state around the buggy address: [ 682.071450] ffff888079ed3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 682.078808] ffff888079ed3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 682.086173] >ffff888079ed4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 682.093525] ^ [ 682.096893] ffff888079ed4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 682.104258] ffff888079ed4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 15:25:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc020660b, 0x711000) [ 682.111615] ================================================================== [ 682.118968] Disabling lock debugging due to kernel taint [ 682.133333] Kernel panic - not syncing: panic_on_warn set ... [ 682.139242] CPU: 0 PID: 8078 Comm: syz-executor3 Tainted: G B 5.0.0-rc3+ #40 [ 682.147723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.157078] Call Trace: 15:25:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc028660f, 0x711000) [ 682.159678] dump_stack+0x1db/0x2d0 [ 682.163316] ? dump_stack_print_info.cold+0x20/0x20 [ 682.168341] panic+0x2cb/0x65c [ 682.171535] ? add_taint.cold+0x16/0x16 [ 682.175519] ? __ext4_expand_extra_isize+0x16c/0x240 [ 682.180621] ? preempt_schedule+0x4b/0x60 [ 682.184792] ? ___preempt_schedule+0x16/0x18 [ 682.189212] ? trace_hardirqs_on+0xb4/0x310 [ 682.193538] ? __ext4_expand_extra_isize+0x16c/0x240 [ 682.198645] end_report+0x47/0x4f [ 682.202107] ? __ext4_expand_extra_isize+0x16c/0x240 [ 682.207222] kasan_report.cold+0xe/0x40 15:25:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x711000) 15:25:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x176, 0x7fffefa5) 15:25:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0xffffffffffffffbc, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001b1, 0x0) [ 682.211203] ? __ext4_expand_extra_isize+0x16c/0x240 [ 682.216316] check_memory_region+0x123/0x190 [ 682.220732] memset+0x24/0x40 [ 682.223859] __ext4_expand_extra_isize+0x16c/0x240 [ 682.228803] ext4_mark_inode_dirty+0x827/0xb80 [ 682.233476] ? ext4_expand_extra_isize+0x5c0/0x5c0 [ 682.238411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.243956] ? __ext4_journal_start_sb+0x1af/0x630 [ 682.248892] ? check_preemption_disabled+0x48/0x290 [ 682.253914] ? ext4_journal_abort_handle.isra.0+0x260/0x260 [ 682.259637] ext4_dirty_inode+0x8f/0xc0 [ 682.263619] ? ext4_setattr+0x25c0/0x25c0 [ 682.267779] __mark_inode_dirty+0xab5/0x1590 [ 682.272188] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 682.277375] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 682.282570] ? __inode_attach_wb+0x1380/0x1380 [ 682.287157] ? trace_hardirqs_on+0xbd/0x310 [ 682.291485] ? ktime_get_coarse_real_ts64+0x24c/0x3b0 [ 682.296674] ? current_time+0x6e/0x1b0 [ 682.300564] ? trace_hardirqs_off_caller+0x300/0x300 [ 682.305673] ? inode_init_owner+0x340/0x340 [ 682.310003] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 682.315024] ? ktime_get_coarse_real_ts64+0x24c/0x3b0 [ 682.320220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.322292] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #17340: comm syz-executor2: corrupted xattr entries [ 682.325753] ? timespec64_trunc+0xf0/0x180 [ 682.325778] ? inode_init_owner+0x340/0x340 [ 682.325795] ? lock_release+0xc40/0xc40 [ 682.347662] kobject: 'slcan1' (00000000f3b25277): kobject_add_internal: parent: 'net', set: 'devices' [ 682.349732] generic_update_time+0x268/0x440 [ 682.349747] ? file_remove_privs+0x500/0x500 [ 682.349769] ? timespec64_trunc+0x180/0x180 [ 682.349784] ? __sb_start_write+0x1ac/0x360 [ 682.349799] touch_atime+0x2a4/0x320 [ 682.349814] ? file_remove_privs+0x500/0x500 [ 682.384799] ? file_remove_privs+0x500/0x500 [ 682.384814] ? atime_needs_update+0x710/0x710 [ 682.384831] ? __down_interruptible+0x740/0x740 [ 682.384845] ? mntget+0x41/0x50 [ 682.384864] trailing_symlink+0x2d4/0x970 [ 682.384883] path_mountpoint+0x9ee/0x21a0 [ 682.384898] ? kasan_slab_alloc+0xf/0x20 [ 682.384911] ? kmem_cache_alloc+0x12d/0x710 [ 682.384922] ? getname_flags+0xd6/0x5b0 [ 682.384934] ? user_path_mountpoint_at+0x29/0x50 [ 682.384948] ? ksys_umount+0x198/0x1340 [ 682.384962] ? __x64_sys_umount+0x54/0x80 [ 682.384978] ? do_syscall_64+0x1a3/0x800 [ 682.384998] ? path_openat+0x5650/0x5650 [ 682.385012] ? check_stack_object+0x114/0x160 [ 682.385026] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.385039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.385054] ? __phys_addr_symbol+0x30/0x70 [ 682.385067] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 682.385079] ? __check_object_size+0xa3/0x790 [ 682.385096] filename_mountpoint+0x258/0x490 [ 682.385117] ? user_path_at_empty+0x50/0x50 [ 682.385143] ? digsig_verify.cold+0x32/0x32 [ 682.385163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.385174] ? getname_flags+0x277/0x5b0 [ 682.385190] user_path_mountpoint_at+0x3a/0x50 [ 682.385206] ksys_umount+0x198/0x1340 [ 682.385218] ? putname+0xef/0x130 [ 682.385232] ? rcu_read_lock_sched_held+0x110/0x130 [ 682.385246] ? kmem_cache_free+0x225/0x260 [ 682.385259] ? putname+0xf4/0x130 [ 682.385275] ? __detach_mounts+0x4d0/0x4d0 [ 682.385287] ? do_unlinkat+0x21a/0x9e0 [ 682.385307] ? do_syscall_64+0x8c/0x800 [ 682.385321] ? do_syscall_64+0x8c/0x800 [ 682.385335] ? lockdep_hardirqs_on+0x415/0x5d0 [ 682.385349] ? trace_hardirqs_on+0xbd/0x310 [ 682.385365] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.385379] ? trace_hardirqs_off_caller+0x300/0x300 [ 682.385396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.405798] kobject: 'slcan1' (00000000f3b25277): kobject_uevent_env [ 682.406340] __x64_sys_umount+0x54/0x80 [ 682.406356] do_syscall_64+0x1a3/0x800 [ 682.406373] ? syscall_return_slowpath+0x5f0/0x5f0 [ 682.406389] ? prepare_exit_to_usermode+0x232/0x3b0 [ 682.406407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 682.406425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.421463] kobject: 'slcan1' (00000000f3b25277): fill_kobj_path: path = '/devices/virtual/net/slcan1' [ 682.422862] RIP: 0033:0x45aae7 [ 682.422877] Code: 44 00 00 b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.422885] RSP: 002b:00007ffc8e714918 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 682.422898] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045aae7 [ 682.422906] RDX: 0000000000402eb0 RSI: 0000000000000002 RDI: 00007ffc8e7149c0 [ 682.422914] RBP: 000000000000060a R08: 0000000000000000 R09: 0000000000000010 [ 682.422922] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffc8e715a50 [ 682.422930] R13: 00000000015fd940 R14: 0000000000000000 R15: 0000000000000003 [ 682.424021] Kernel Offset: disabled [ 682.674122] Rebooting in 86400 seconds..