f0000000140)='./file0/../file0\x00', 0x0, 0x2, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:19 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x6c000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1270.722282] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1270.792390] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1270.810943] EXT4-fs (sda1): re-mounted. Opts: 03:50:19 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac141419]}], 0x10) 03:50:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x79000000}) 03:50:19 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0xfffffdef, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:19 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x6c00, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:19 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfeffffff00000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1271.408308] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1271.442109] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1271.452147] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:50:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:20 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xffffffffa0010000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1271.526945] EXT4-fs (sda1): re-mounted. Opts: 03:50:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xf5ffffff00000000}) 03:50:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x1000000, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1271.676839] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:20 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfeffffff]}], 0x10) 03:50:20 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf83f0000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:20 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x2000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x300000000000000, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x8000000000000}) 03:50:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1272.365303] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:21 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0xeffdffffffffffff, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x300}) 03:50:21 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x300, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:21 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac141414]}], 0x10) 03:50:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:21 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0xa0008000, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x500}) 03:50:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x500, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:21 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfcfdffff, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x79}) 03:50:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:21 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xc0, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1273.276480] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:21 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0xeffdffff, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x48, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:22 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x131414ac]}], 0x10) 03:50:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x600000000000000}) 03:50:22 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x700000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:22 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfffffdfd, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x8000a0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x7a00000000000000}) [ 1274.170095] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:22 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfffffff6, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0xfeffffff, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:22 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x500000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:23 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x1a1414ac]}], 0x10) 03:50:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x8cffffff00000000}) 03:50:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x300, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:23 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4800000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:23 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7a000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x6800}) 03:50:23 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x8000a0ffffffff, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1275.077607] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0xffffffffa0008000, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:23 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x48000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:24 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x2000]}], 0x10) 03:50:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xffffff8c}) 03:50:24 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x900, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0xfdef, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1f000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1275.915973] EXT4-fs: 25 callbacks suppressed [ 1275.915985] EXT4-fs (sda1): Unrecognized mount option "Œ" or missing value 03:50:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1275.972540] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x2, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1276.014166] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xdac}) 03:50:24 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x74, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1276.056552] EXT4-fs (sda1): re-mounted. Opts: 03:50:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3f00, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1276.179560] EXT4-fs (sda1): Unrecognized mount option "¬" or missing value [ 1276.215208] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1276.335415] EXT4-fs (sda1): re-mounted. Opts: 03:50:25 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac141418]}], 0x10) 03:50:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x3, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:25 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x4000000000000}) 03:50:25 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x6000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x10000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1276.816648] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1276.855319] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:25 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x4800000000000000}) [ 1276.887087] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1276.930744] EXT4-fs (sda1): re-mounted. Opts: 03:50:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:25 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x600, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf8f73f0000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x200000000000000, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1277.031174] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:50:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x8, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x7900}) 03:50:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x400000000000000, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:26 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xa00]}], 0x10) 03:50:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x20000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1277.788323] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x7a00}) 03:50:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x1a0ffffffff, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x68000000}) 03:50:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x3ff7f8, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:27 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14140f00000000]}], 0x10) 03:50:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0xfeffffff00000000, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c00000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:27 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x2d000000}) 03:50:27 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x6800000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1278.685853] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:27 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x4c00}) 03:50:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x4000000, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:27 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4000000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x5000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:28 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac141410]}], 0x10) 03:50:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:28 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x40000000}) 03:50:28 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x3000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:28 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100030, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:28 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xf6ffffff, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:28 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xac0d0000}) [ 1279.616195] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c00, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:28 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100011, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:29 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141b00000000]}], 0x10) 03:50:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x40000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x2800}) 03:50:29 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itably'}]}) 03:50:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x600, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xffffff8c, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x8000a0ffffffff}) [ 1280.535571] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:29 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xfffffffe}) 03:50:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x1000000000}) 03:50:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfffffff5, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:29 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xffffffffa0008000}) 03:50:29 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x4800]}], 0x10) 03:50:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1281.385250] EXT4-fs: 28 callbacks suppressed [ 1281.385285] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1281.404700] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1281.437122] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:30 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x74000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:30 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xfcfdffff}) 03:50:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x100000000000000}) [ 1281.502379] EXT4-fs (sda1): re-mounted. Opts: 03:50:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x400000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1281.634161] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1281.681838] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value 03:50:30 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x9000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:30 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x3f000000}) [ 1281.836346] EXT4-fs (sda1): re-mounted. Opts: [ 1281.890139] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1281.918622] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:50:30 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x1b1414ac]}], 0x10) 03:50:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xfdef}) 03:50:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:30 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x20000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:30 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xfffffdfd}) [ 1282.287198] EXT4-fs (sda1): Unrecognized mount option "ý" or missing value 03:50:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1282.337558] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1282.373257] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xffffffffa0010000}) 03:50:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x10}) 03:50:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c00, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:31 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x3ff800, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:31 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x5]}], 0x10) 03:50:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x300000000000000}) 03:50:31 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x1000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x28}) 03:50:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffff6, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:31 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xf5ffffff, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1283.260682] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xf8f73f0000000000}) 03:50:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xf0ffffff7f0000}) 03:50:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:32 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x3000000]}], 0x10) 03:50:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:32 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x80000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:32 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x1a0}) 03:50:32 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x2000}) 03:50:32 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:32 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:32 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xf83f00, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1284.164649] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:32 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x2d00}) 03:50:32 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xeffdffff}) 03:50:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:33 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x23000000]}], 0x10) 03:50:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xf8f73f00}) 03:50:33 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x7a000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:33 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x4}) 03:50:33 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x100000}) [ 1285.058793] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:33 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:33 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x400000000000000}) 03:50:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:34 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfec0]}], 0x10) 03:50:34 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:34 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x40000}) 03:50:34 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xac0d0000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:34 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xeffd}) 03:50:34 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x6c00}) 03:50:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:34 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1285.964361] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:34 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x3}) 03:50:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:34 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3f000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:35 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x121414ac]}], 0x10) 03:50:35 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x5}) 03:50:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x8000a0ffffffff}) 03:50:35 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffffffa0008000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1286.845883] EXT4-fs: 27 callbacks suppressed [ 1286.845895] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1286.872076] EXT4-fs (sda1): Unrecognized mount option "" or missing value 03:50:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1286.898810] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x8000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xeffdffffffffffff}) [ 1286.953850] EXT4-fs (sda1): re-mounted. Opts: 03:50:35 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x7a}) 03:50:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:35 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2000000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1287.068267] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1287.136377] EXT4-fs (sda1): Unrecognized mount option "z" or missing value [ 1287.246360] EXT4-fs (sda1): re-mounted. Opts: 03:50:36 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x4c]}], 0x10) 03:50:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:36 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xf83f0000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x2000000}) 03:50:36 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x3000000}) 03:50:36 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1287.784100] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1287.802969] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1287.807562] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:36 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xf5ffffff}) 03:50:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x300}) 03:50:36 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x16, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1287.892057] EXT4-fs (sda1): re-mounted. Opts: 03:50:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:36 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfeffffff, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1288.078358] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:37 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x200000000000000]}], 0x10) 03:50:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x8000a0}) 03:50:37 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x5, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:37 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x2d00000000000000}) 03:50:37 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf8f73f00, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:37 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x48000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1288.738047] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:37 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xfdfdffff}) 03:50:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x7ffffffff000}) 03:50:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:37 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfdfdffff, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:38 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141900000000]}], 0x10) 03:50:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:38 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4c000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:38 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x2}) 03:50:38 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x700000000000000}) 03:50:38 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x300000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) [ 1289.640354] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:38 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x48000000}) 03:50:38 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x6800, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:38 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xa0008000}) 03:50:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:39 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x2000000000000000]}], 0x10) 03:50:39 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xa0008000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:39 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x700}) 03:50:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:39 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:39 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xfeffffff}) [ 1290.541964] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:39 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x6c00000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:39 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x2d}) 03:50:39 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x100000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:39 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x1000000}) 03:50:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:39 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x10000000]}], 0x10) 03:50:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:39 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x10000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:39 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xffffffffa0008000}) 03:50:39 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xfffffffffffffdef}) 03:50:39 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x40000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280), 0x0, 0x0}}], 0x1, 0x0) 03:50:40 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xffffff7f00000000}) 03:50:40 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x7400, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1291.474819] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x4}], 0x1, 0x0) 03:50:40 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x200000000000000}) 03:50:40 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x200000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:40 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfffffffe, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xa00000000000000}], 0x1, 0x0) 03:50:40 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x74000000}) 03:50:40 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xfeffffff00000000}) 03:50:40 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14140d]}], 0x10) 03:50:40 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x68000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x20000000}], 0x1, 0x0) [ 1292.387939] EXT4-fs: 25 callbacks suppressed [ 1292.387951] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1292.400129] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1292.411158] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1292.445893] EXT4-fs (sda1): re-mounted. Opts: 03:50:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xffff0000}], 0x1, 0x0) 03:50:41 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x2000000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x7a000000}) 03:50:41 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xa0010000}) 03:50:41 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x900}], 0x1, 0x0) 03:50:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x9}], 0x1, 0x0) 03:50:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x40030000000000}], 0x1, 0x0) 03:50:41 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xfffffdef}) [ 1292.714504] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1292.731554] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1292.771275] EXT4-fs (sda1): re-mounted. Opts: 03:50:41 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfffc]}], 0x10) 03:50:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x10000000}], 0x1, 0x0) 03:50:41 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x68000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x6000000000000000}) 03:50:41 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc0000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:41 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0xffffffff00000000}) 03:50:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1c00}], 0x1, 0x0) [ 1293.258412] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1293.286870] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1293.301042] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:50:41 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x1a0ffffffff}) [ 1293.367593] EXT4-fs (sda1): re-mounted. Opts: 03:50:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xa00}], 0x1, 0x0) 03:50:42 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xc0000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x2000000000000000}) 03:50:42 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1293.567745] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:50:42 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xa]}], 0x10) 03:50:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1c}], 0x1, 0x0) 03:50:42 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x1000000000000}) 03:50:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x40000000000000}) 03:50:42 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x1000000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:42 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x700, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:42 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x400000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xf5ffffff00000000}], 0x1, 0x0) [ 1294.208173] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x7000000}) 03:50:42 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x600000000000000}], 0x1, 0x0) 03:50:42 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x3000000}) 03:50:43 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14140a00000000]}], 0x10) 03:50:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xe0000000}], 0x1, 0x0) 03:50:43 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x1a0, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:43 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}], [], 0x4000000}) 03:50:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xfdfdffff00000000}) 03:50:43 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8000a0ffffffff, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x4000000}], 0x1, 0x0) [ 1295.105036] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x100000000000000}) 03:50:43 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x40, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440), &(0x7f0000000480)=0x14) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x100, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x9, 0xeaee, 0x1, 0x100000000000000]}) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x8, 0x401}]}, 0xc, 0x1) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) ioctl(r1, 0x20, &(0x7f00000003c0)="5266e621a772ca0f05b3") 03:50:43 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x48, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xeffdffff}], 0x1, 0x0) 03:50:43 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffffffa0010000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xf6ffffff00000000}) 03:50:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x4000}], 0x1, 0x0) 03:50:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:44 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x4000000000000000]}], 0x10) 03:50:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffff5, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:44 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f0000000840)) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001600000002000000020000000200000002dfffff0d000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)) fstat(0xffffffffffffff9c, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000e80)=0xe8) sendmsg$nl_xfrm(r2, &(0x7f00000010c0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x40001000}, 0xc, &(0x7f0000001080)={&(0x7f0000000ec0)=@delpolicy={0x1c0, 0x14, 0x100, 0x70bd26, 0x25dfdbfe, {{@in6, @in6=@local, 0x4e22, 0x7fffffff, 0x4e23, 0xd70, 0xa, 0xa0, 0x80, 0x5c, r3, r1}, 0x6e6bb6, 0x1}, [@replay_esn_val={0x3c, 0x17, {0x8, 0x70bd2b, 0x70bd25, 0x70bd2b, 0x70bd25, 0x5, [0x8, 0x3, 0x3, 0xfff, 0x0, 0x1, 0x3f, 0xca7]}}, @encap={0x1c, 0x4, {0xffffffffffffffff, 0x4e23, 0x4e23, @in=@multicast1}}, @etimer_thresh={0x8, 0xc, 0x9}, @algo_crypt={0x4c, 0x2, {{'ecb-cast6-avx\x00'}, 0x10, "2ed9"}}, @lastused={0xc, 0xf, 0x3}, @algo_crypt={0x78, 0x2, {{'ecb-serpent-avx\x00'}, 0x170, "b6d34e41c7d34fb3ef2901c97cdcb181cdc3e8bbce2f43cab2e4395ce9e672e2c650537d5fb8e910d31b8218a3b2"}}, @proto={0x8, 0x19, 0x32}, @mark={0xc, 0x15, {0x35075b, 0x8000000000000}}, @replay_val={0x10, 0xa, {0x70bd27, 0x70bd2a, 0x2}}, @encap={0x1c, 0x4, {0xffffffffffffffff, 0x4e24, 0x4e20, @in6=@mcast2}}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x8040}, 0x5) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)=0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x5, &(0x7f0000000100)=[{&(0x7f00000003c0)="ddf96145f1c04a048bf51489efbac3be6f9ace8e9bec703386f3656cc6fb96e17751982a5d3c290593169c390e2f4153d0b4f1ec8e5f531bb39ee33882f398f27864d225327254c1eb73aed352465c6971fe9ca42eefc7a6c17ca1e093f228fb08b5144547bc46d26583e614b7a5953e855006cc6ac0e5b30ce9260786c1a4fbe3aaf8a42fa74ee15814079abd684ae819427e4172861d8947f65eeb7d18911c2908028b5c0cd9421eb9a4dafd9d4d6066a5d6fc1a0a894033e0c7cd4f5fb754c6214eb255a5e83092b5a3e72585da07ff0e7061a86499b686358842dca7875ada2c9ca7c9f3bbac56ae905e4e8a8d", 0xef, 0x60}, {&(0x7f00000004c0)="855c4082debe42dfa314c20106da0017083a46873821c7b4f9a93314971eabd053799b50db7329dca43e661f3f9335de84ba81d77b1a34ae358e1c4d58de7dddf1daf9a5739e8465bc2d684c86deacf09ae533d875381ef4c9deb4f1c4c91d71b0b983253fb066d925fd499703add82c0d5dd61f18872b2ac7bdc6c48264c3136cc7761f78b8229b7420a3a81d08838406e43d07b4f9b2b4d4f7ccc226211c17e62dc1380d35edb441e5603634b0314110b91710123b45dc3b37b0d219965bf4d223acb1ad2bc5938f51019840270dfb40fee2d618be8d0f71eb03d5472781489e038e1cbdb22dc0", 0xe8, 0x5}, {&(0x7f00000005c0)="19de009162fb34e1ffcf86e36765685bfd2767c4a8b0394084c60db409f6241991235b9f3aadda3a54bc6b9d4ba399a976899cbb20ae8597287e588cde94a17111b674210e1beb78dcd723f557071cd8337012a951ab9739a827daaf24f8a42d75423a36bee34aa4f61c5cf808ffb720e7f36f8f3f67b228fbed2a23a5b10ecea867c54373df026fd674f38ce58473e15e1f73c99c1bae69a37b60e82400ac6957290901844eba0bf34f660d320870233622e91cbffb4cec2b19a71dff347ae2078b9400137f699e5fb2dd8a8f26fc56f3", 0xd1, 0x7f}, {&(0x7f00000006c0)="4f7cf88f6069c178b9386457436a4ae4951d6c5926db1ae566066897bcba70ba6a8f327c9609da5da69d4b84089a4702760d50b41411180f3ceb0f7a8d510a08d2113f733faa7ab6cc42c246fd9aa72a9d09ce137f654c72ea29ee99642e00750b1df2f18cc93c2c2c84e1a6888c9737eeb935422d58f7473eb7fdb5a245530973cabf4ac2c82fe10070f8dc3867d9b960", 0x91, 0x7fffffff}, {&(0x7f0000000780)="157d2629480ade5effe3ffce29213af7c7612e6722a4213ebbc45cdf222203151ee609de1414da12cb79b9526519a04b44b74f5c9e3198ad40027e895b3123ae7422d220c721b8b29410b460be1b55c291f81941b509cd98e1c851ec93c10eba40c4e643c35cfc758d3cfe28645094d1b2332f64fd0b5713ff5c5273d588eed8b01c7adede6b873e3a74ddaae2fe226eba624a708f68872db65498aeef081edfab8172bcdc2c63ad4201e65621d1274dfe4ac0698c41b8a42bd6ce347c", 0xbd, 0x1000}], 0x420, &(0x7f0000000a80)={[{@gid={'gid', 0x3d, r0}}, {@type={'type', 0x3d, "641a73d5"}}, {@quiet='quiet'}, {@part={'part', 0x3d, 0x4}}, {@type={'type', 0x3d, "bd134737"}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_gt={'fowner>', r1}}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, '-\'ppp0('}}, {@fowner_gt={'fowner>', r4}}, {@euid_lt={'euid<', r5}}]}) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1295.982795] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x5}], 0x1, 0x0) 03:50:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x8cffffff}) 03:50:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x300000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:44 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = add_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="b33a827b0b1fa26ef800b6383100f5a9135650ee88883f060a48afa7", 0x1c, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x481) ioctl$RTC_VL_CLR(r1, 0x7014) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="696e690300b5c9158ce2d35200"]) 03:50:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4800000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xa}], 0x1, 0x0) 03:50:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xf0ffffffffffff}], 0x1, 0x0) 03:50:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x2d00000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x400000000000000}], 0x1, 0x0) 03:50:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x80000}) 03:50:45 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x6c]}], 0x10) 03:50:45 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x800000000000000}], 0x1, 0x0) 03:50:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xffffffffa0010000}) 03:50:45 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x400000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xf5ffffff}], 0x1, 0x0) [ 1296.868308] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:45 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x700, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x48}) 03:50:45 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001000, &(0x7f00000000c0)=ANY=[]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x880, 0xb9) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="92beeb51f145380ebd6c1633cf0000000000000000"]) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140)=0x9, 0x4) 03:50:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf6ffffff, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x7}], 0x1, 0x0) 03:50:46 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x68]}], 0x10) 03:50:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xe0}], 0x1, 0x0) 03:50:46 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x4}, 0x28, 0x3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000400)=ANY=[@ANYBLOB="696e69745f697461626c652c0035f10cbd407c3cb644fca380e97f5564e5136e18f82f853c99623696e39760824d9da91175c5ffa17bf3c19230c46851121bb5eaa6eba213bfa341ad508494a210fdb05323b4d4ab91ad03db11b62f56b575771572c91e152e31d8dc96dae5649bd67ff2c357660bc3acf2829e600b789043f600204d780753a2c243145ef3de5b27b9b0d53ca25dcb2800c3fcc02899658d8bce23c19416611214facaf66b57ebf999813f68f35294f2fb9ccb389ea231737c7b780181a541c14e2e"]) 03:50:46 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x300, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7a00, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xffffffffffffffff}) [ 1297.748005] EXT4-fs: 28 callbacks suppressed [ 1297.748016] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value [ 1297.762515] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xeffdffff00000000}], 0x1, 0x0) 03:50:46 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x80000, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfffffffffffffff9, 0x10000) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000100)={0x4, r1, 0x1}) [ 1297.840760] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1297.854703] EXT4-fs (sda1): re-mounted. Opts: 03:50:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x4000000000000000}], 0x1, 0x0) 03:50:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x1f000000}) 03:50:46 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7a, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1298.075681] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1298.106616] EXT4-fs (sda1): re-mounted. Opts: [ 1298.116167] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:47 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x191414ac]}], 0x10) 03:50:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x4000000000000}], 0x1, 0x0) 03:50:47 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000100)=r1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000140)=""/11) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0x3cd, &(0x7f00000003c0), 0x100024, &(0x7f00000003c0)={[{@init_itable='init_itable'}], [{@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@obj_user={'obj_user', 0x3d, 'init_itable'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x77, 0x77, 0x39, 0x38, 0x38, 0x30, 0x37], 0x2d, [0x37, 0x37, 0x32, 0x77], 0x2d, [0x7a, 0x37, 0x77, 0x63], 0x2d, [0x66, 0x0, 0x30, 0x67], 0x2d, [0x76, 0x76, 0x65, 0x7f, 0x30, 0x37, 0x37, 0x31]}}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}) 03:50:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x8}) 03:50:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6800000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:47 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x100000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xffffffff00000000}], 0x1, 0x0) [ 1298.641730] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1298.670531] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1298.681049] EXT4-fs (sda1): Unrecognized mount option "" or missing value 03:50:47 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000028c0)=0x0) getresuid(&(0x7f0000002900), &(0x7f0000002940)=0x0, &(0x7f0000002980)) r3 = getgid() r4 = openat$random(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/urandom\x00', 0x800, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002a40)={&(0x7f0000002a00)='\x00', 0xffffffffffffff9c}, 0x10) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002a80)='syz0\x00', 0x200002, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002b00)={&(0x7f0000002ac0)='./file0\x00', 0x0, 0x8}, 0x10) r8 = accept4$unix(0xffffffffffffff9c, &(0x7f0000002b40), &(0x7f0000002bc0)=0x6e, 0x800) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000002c00)={0xc, 0x1, 0x2, 0x80, 0x10, 0x1, 0x80000001}, 0x2c) r10 = socket$key(0xf, 0x3, 0x2) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/ptmx\x00', 0x50500, 0x0) r12 = syz_open_dev$dmmidi(&(0x7f0000002c80)='/dev/dmmidi#\x00', 0x101, 0x80000) r13 = perf_event_open(&(0x7f0000002d00)={0x2, 0x70, 0x0, 0x4, 0x4, 0xfff, 0x0, 0x7ff, 0x8000, 0x5, 0x4, 0x84, 0x1, 0x1, 0xfffffffffffffc01, 0x8001, 0x7f, 0x6, 0xc806, 0x100000001, 0x2, 0x9, 0x2, 0xa9, 0x1, 0x20000000000, 0x88c, 0xac, 0x1, 0x8, 0x4, 0x4, 0x70, 0x80000000, 0x2, 0x6, 0xc3a, 0x8000000000, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000002cc0), 0x8}, 0x8000, 0xffff, 0x8, 0x2, 0x5, 0x8001, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffff9c, 0x2) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000002d80)={0xffffffffffffffff}) r15 = socket$pptp(0x18, 0x1, 0x2) r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000002dc0)='/dev/ptmx\x00', 0x800, 0x0) r17 = openat$urandom(0xffffffffffffff9c, &(0x7f0000002e00)='/dev/urandom\x00', 0x2f8acb8d8a7df23, 0x0) r18 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002e40)='syz1\x00', 0x200002, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002e80)=0x0) r20 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000002ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000003240)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r23 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) clock_gettime(0x0, &(0x7f0000003280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffff9c, 0xc058560f, &(0x7f00000032c0)={0x40, 0xc, 0x4, 0x11100, {r24, r25/1000+10000}, {0x3, 0xc, 0x9, 0x2, 0x401, 0xff, "e24779a5"}, 0x4, 0x7, @fd=0xffffffffffffff9c, 0x4}) r27 = openat$fuse(0xffffffffffffff9c, &(0x7f0000003340)='/dev/fuse\x00', 0x2, 0x0) r28 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000033c0)={&(0x7f0000003380)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00'}, 0x10) r29 = syz_open_dev$sndseq(&(0x7f0000003400)='/dev/snd/seq\x00', 0x0, 0x509800) r30 = openat$rtc(0xffffffffffffff9c, &(0x7f0000003440)='/dev/rtc0\x00', 0x200000, 0x0) r31 = socket$can_raw(0x1d, 0x3, 0x1) r32 = openat$mixer(0xffffffffffffff9c, &(0x7f0000003480)='/dev/mixer\x00', 0x480, 0x0) r33 = openat$fuse(0xffffffffffffff9c, &(0x7f00000034c0)='/dev/fuse\x00', 0x2, 0x0) r34 = socket$can_raw(0x1d, 0x3, 0x1) r35 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r36 = gettid() r37 = geteuid() r38 = getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005900)=0x0) lstat(&(0x7f0000005940)='./file0\x00', &(0x7f0000005980)={0x0, 0x0, 0x0, 0x0, 0x0}) r41 = getgid() r42 = getpid() stat(&(0x7f0000005a00)='./file0\x00', &(0x7f0000005a40)={0x0, 0x0, 0x0, 0x0, 0x0}) r44 = getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000005ac0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005b00)={{{@in6=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000005c00)=0xe8) stat(&(0x7f0000005c40)='./file0\x00', &(0x7f0000005c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r48 = syz_open_dev$media(&(0x7f0000006fc0)='/dev/media#\x00', 0x2, 0x6c802) r49 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000007000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r50 = openat$autofs(0xffffffffffffff9c, &(0x7f0000007100)='/dev/autofs\x00', 0x1, 0x0) r51 = syz_open_dev$vcsa(&(0x7f0000007140)='/dev/vcsa#\x00', 0x1, 0x4000c0) r52 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000007180)='/proc/self/attr/current\x00', 0x2, 0x0) r53 = syz_open_dev$ndb(&(0x7f00000071c0)='/dev/nbd#\x00', 0x0, 0x101080) sendmmsg$unix(r0, &(0x7f0000007240)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000026c0)=[{&(0x7f00000003c0)="e09b067d8f3b2a9a5cfb1fa1ad4f02a15d00f14410f5ce1fa27fd5697e8bc5c6f33b03d457441a194472f9f2235ff7af36a1920829562d1d891e7b0a1504b2fc04f9e5351210c7e0cbf374404a66f8c80c931d4f6352d6f6235a7fb2366bf8174ee370dc9e9b659bb14cbabd839369160c95ec524f3a157a0e340ef9a7e96e3308605794f2879698334b1d95949592abbae6aafa644293cf8b9446ec61d1ebd2171ff944138fa2c1fba3cd0cb9e98b5fcd28b5354edbef1e85696ed747ced33ee40b90092f815b595558a7734e3abfa1149c440d2d", 0xd5}, {&(0x7f0000000100)="063d124b71ab20c656b9e82f38c5288a2c87774fdce445c36fa6220299f292b0e7d70ea3c48ecd65a334787e867154aa0cb681e78aafd31b1f603eeea37b7c", 0x3f}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="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", 0x1000}, {&(0x7f0000000140)="4363d220a484a95486ce10c859291cdb537bc42cb5205a61be2ebf8f427a1ed7029b1b79a2defb327fdfbd3ce6a3b0aef0e0b48e2a008862", 0x38}, {&(0x7f0000000240)="6bb676f83dc2c4d0a4fa000deb066e87e6cfb0f4587e0ace9809e3a12b6eccf610fadbf7b7e34b342c894c0e3b4df0c486771d57da79e4bc6b5ad71e7585bf24639253e1a3020fb4a29e45ee92", 0x4d}, {&(0x7f00000024c0)="62c8d10b64484a6a30d27ac22a33550d774e165affd047ba4092abfc97252840c09fbf4ee6de0e610e246341397333b8468c55513b6ab0dd320d5cbd9ec5a2e95799f6f3c33acfab80e2916a0386d888b8dc9f7aee466ef12cf35ad3ac3f6c87875c6e4d20c47ead0ceb98824bf26a929070c5a447e21ba1260890d500aed8eb8a0fa7d7c253fd0f74be8af7b3c5ce3e42c76588c32e505c34fcff54f6e9cedce87c85980e2ca51695fce2a6", 0xac}, {&(0x7f0000002580)="ace0f92408fd4fc312dfbb203ab437f5458b2027a7bbdf4c8805ebacbe7b59767c72ef89df7cf2fba0d74fd6c6adee4a6580dfc8cf9714c61164b42735b25cc9dfb87f30ac5835820f9268031b96fb25ccb5fae554095857f4cd357a2e99b777df86dcff202aa37743e856baee9dcac033b0a60565a610afebb57306e3eb6f02f9ccd1bf06830678e3a63393b771bbcee96d9f3eb8e18732b956849bc3dc173797485b0b7b68533015ece6e6aa9361626535b6c4d9621caafff45d936a965676b9fb46d6ffd381b1cd068c584cb45efdea89040469a554d18fe319dc5d442dda51", 0xe1}, {&(0x7f0000002680)="25890a87d52e188bf0763d3dcd252fa6a9d10bc673bd0a145b50acb646e1", 0x1e}], 0x9}, {&(0x7f0000002780)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002880)=[{&(0x7f0000002800)="b38057660975a3daef3906317e60ea1fb16d2d899500444a6a3ed59c0c6432f8b72755f7aa3785dbaedaa7fafd9fd2322f40b443af59b4921a05c55b2fdf9d39ea103993f066f53c4991822cf32317cd29fcefce436635073f5eaf36d0589f34720f4ccbf8e65c6a", 0x68}], 0x1, &(0x7f0000002f40)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x30, 0x1, 0x1, [r4, r5, r6, r7, r8, r9, r10]}, @rights={0x18, 0x1, 0x1, [r11, r12]}, @rights={0x28, 0x1, 0x1, [r13, r14, r15, r16, r17, r18]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0xb0, 0x4}, {&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003200)=[{&(0x7f0000003080)="99cce0246546581847ea43d99e56ecd9430cae657795e1e2a331d5ce717f8d248806300abeceb4d183b77d9cd1092aea594e5b9c484602c22a410a5a17818381773bae952d68004fb8ec3ff5ebc7b9008047388134bbba13b1e93da88e234ef37fc220842b57640fd5d84e38ff1325555e8047b8dbc5864b4271ae89b1b19b6f49aa1d76faaa18360b8de0dbb521cd1c2b4e32b24281853a0507", 0x9a}, {&(0x7f0000003140)="702dbf4d446397522902dc6625fb65828156f4df7bf366b7aff3f1570998ad48fe60b36947bd314ab68883d192ab241333af48ceea18352d3a0d2e1157f276a244c87580897bf807b17d335a2bc8e068684f2fb8bcae4a32eb0144741c", 0x5d}, {&(0x7f00000031c0)="464afa89738541d435d94c5d2bd5f84b5880153de95189dfb62ef0a5dd9295", 0x1f}], 0x3, &(0x7f0000007040)=ANY=[@ANYBLOB="38000000000000000100000001000000", @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r26, @ANYRES32=r27, @ANYRES32=r28, @ANYRES32=r29, @ANYRES32=r30, @ANYRES32=r31, @ANYRES32=r32, @ANYBLOB="000000876f0000079d41a882c2e9ad00006f97824a7ed60000000100", @ANYRES32=r33, @ANYRES32=r34, @ANYRES32=r35, @ANYBLOB='\x00\x00\x00\x00'], 0x58}, {&(0x7f00000035c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005880)=[{&(0x7f0000003640)="f1bfa6ed1250e6ab31f883009722967832c430164c58", 0x16}, {&(0x7f0000003680)="bf0ebf06bc922e7b72c3e7afbdaeafaa80c25aa3331187d539f8fb45a7f71391f36d75ca9d57ae4a105dceaf99b638a8b44dd41c158ac0ef4640c62131473f1eeff3658badd1d1ee16f0ba8b22d509a2bcfa635917b5e32f4b67c540b39d79690887c2afe61d302af85305d2e6b9c93400b9bef9b0ce28745f3f5b49bfaed023fb9278acb5b6d92862d59d2e29d534539d3b60324a740d37172396f125ff34dfdb0638c411b5bf1cd5e1dbf918cfd433bb47", 0xb2}, {&(0x7f0000003740)="069dafdc33b05d015d4f19703d59aac4c3f02f51e1b3ec850c3485443773e4e43572ef1a70cf8f21b2f79249003fe70b57840f912556632a5199f3201eda57a1c246cb138cc218618399eeb37dbe059e6825d5a2f1ef6491bbce72dbc2ea262bb8f8b0fcc9b7c62ab014665974b3b1acccbfcfd39aab658d65285d477bf1475d497cc17ebfa59c99b2eb65e2c27be673080062340fb647abac3f46d06d27bfb775b23a5665207248d01f3c8dbd", 0xad}, {&(0x7f0000003800)="d7fd027595624eb438df4d9fe1d420dbbc167b82786842bb3742a9ea2faa64d742643631d74ce955835294ca994de4372395cb15a7dc0b653846f3fa9a155e6d8239701ca9fa8785992a63ab77f51d449f613b870efbb49ee78936d96e0de5b6830ef030e3e6b0c8acc2ffb079c239b57ba637a8f703", 0x76}, {&(0x7f0000003880)="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", 0x1000}, {&(0x7f0000004880)="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", 0x1000}], 0x6, &(0x7f0000005d00)=[@cred={0x20, 0x1, 0x2, r36, r37, r38}, @cred={0x20, 0x1, 0x2, r39, r40, r41}, @cred={0x20, 0x1, 0x2, r42, r43, r44}, @cred={0x20, 0x1, 0x2, r45, r46, r47}], 0x80, 0x8000}, {&(0x7f0000005d80)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000006f80)=[{&(0x7f0000005e00)="82434670d32a1d9d3774a81215a27d07ba53ec101e802a33589ee169772109595f75b5aa2f28e021a36485f47004f23bff6ae74879bce7039f80a4e68cb1ba6712f856df948e719323ff7537d979d30d70f92d3bea1a5487709de4258844f39baf9fb8e12939322e33e62e6452726204aeaa69a2d0c3d8ad4dd25615e4c6f651aa815f5f", 0x84}, {&(0x7f0000005ec0)="f46ef259ddca3429712319515b4d5232c5dd112810d8e52f6319671e2ee5e5cac5a9644802bf01bddffdd3f44186d9bf9b9abefbd91f70dea130e09268e4fccf6f82ea", 0x43}, {&(0x7f0000005f40)="cc48666f25365984f6d5", 0xa}, {&(0x7f0000005f80)="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", 0x1000}], 0x4, &(0x7f0000007200)=[@rights={0x28, 0x1, 0x1, [r48, r49, r50, r51, r52, r53]}], 0x28, 0x800}], 0x5, 0x40004) 03:50:47 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xc000000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1298.753109] EXT4-fs (sda1): re-mounted. Opts: 03:50:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x8000a0ffffffff}], 0x1, 0x0) 03:50:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xac0d000000000000}) 03:50:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x10, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1299.024286] EXT4-fs (sda1): re-mounted. Opts: 03:50:48 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141c00000000]}], 0x10) 03:50:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xffffff7f00000000}], 0x1, 0x0) 03:50:48 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x7a00, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xf83f00}) 03:50:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:48 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file1\x00', &(0x7f0000000340)='bpf\x00', 0x4, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="696ec9865f697461626c652c0020ea0eca"]) 03:50:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x3}], 0x1, 0x0) 03:50:48 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x20000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1299.613322] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x500000000000000}) 03:50:48 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhci\x00', 0x40, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000001980)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xf000}], 0x1, 0x0) 03:50:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6800, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x3f000000}], 0x1, 0x0) 03:50:49 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x900000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x4c000000}) 03:50:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1a0ffffffff, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:49 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac1414aa00000000]}], 0x10) 03:50:49 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x240, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000004c0)={0x0, 0xaa}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000540)={0x0, 0xffffffffffff8000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r1, 0x8, 0x5, 0xffff, 0x400, 0x7f, 0x7e6, 0x3, {r2, @in6={{0xa, 0x4e20, 0x800, @local, 0x7}}, 0xfffffffffffffffb, 0x6, 0x4, 0x2, 0x81}}, &(0x7f0000000680)=0xb0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x500000000000000}], 0x1, 0x0) [ 1300.504026] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:49 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x1000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x4}) 03:50:49 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x8000000000000) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="696e699f0062e4aa6589edc528e3e0f690df9600000000000000"]) mount$overlay(0x0, &(0x7f0000000140)='\x00', &(0x7f0000000240)='overlay\x00', 0x400, &(0x7f00000003c0)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@metacopy_on='metacopy=on'}, {@xino_auto='xino=auto'}], [{@smackfstransmute={'smackfstransmute', 0x3d, "2c7b74727573746564281a70726f6373656c6673656c66"}}, {@appraise_type='appraise_type=imasig'}]}) 03:50:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x40000}], 0x1, 0x0) 03:50:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x400300}], 0x1, 0x0) 03:50:49 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x500000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x5000000}], 0x1, 0x0) 03:50:49 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x208480, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @mcast1, 0x7fffffff}, @in6={0xa, 0x4e21, 0x2b, @loopback, 0xa8}, @in6={0xa, 0x4e22, 0x2, @local, 0x800}, @in={0x2, 0x4e23, @remote}], 0x64) 03:50:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x11}], 0x1, 0x0) 03:50:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xffffffff00000000}) 03:50:49 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfdfdffff, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:49 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfc00000000000000]}], 0x10) 03:50:49 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x2002) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf, 0x1f, 0x1, 0x3}, 0xf) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xffffffffa0008000}], 0x1, 0x0) [ 1301.415735] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:50 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xfeffffff00000000}) 03:50:50 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x500, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:50 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', '!\x00'}, &(0x7f0000000100)=""/109, 0x6d) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x100020, &(0x7f0000000540)) 03:50:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xa0008000}], 0x1, 0x0) 03:50:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf5ffffff, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x8000000}], 0x1, 0x0) 03:50:50 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x300000000000000}) 03:50:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x500}], 0x1, 0x0) 03:50:50 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xe4ffffff]}], 0x10) 03:50:50 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xc000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x300}], 0x1, 0x0) 03:50:50 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x6}) 03:50:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:50 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200041, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000003c0)={'filter\x00', 0x0, 0x3, 0x44, [], 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000240)=""/68}, &(0x7f0000000080)=0x78) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) getresuid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) r2 = syz_open_dev$media(&(0x7f0000000540)='/dev/media#\x00', 0x8000, 0x10000) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x100) r3 = getgid() lchown(&(0x7f0000000440)='./file0\x00', r1, r3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x10}], 0x1, 0x0) 03:50:50 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x9, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1302.338749] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x6000000}) 03:50:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x34000}], 0x1, 0x0) 03:50:51 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3f00000000000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:51 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@security={'security\x00', 0xe, 0x4, 0x450, 0x290, 0x148, 0x148, 0x148, 0x148, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x8001}}, @common=@socket0={0x20, 'socket\x00'}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xd16b, [0x1ff, 0x7, 0xcb, 0x7fa76664, 0x0, 0x1], 0x80000001, 0x2, 0x83e3}, {0x7ff, [0xffffffffffffffc0, 0xf3b9, 0x3, 0x7, 0x8, 0x5], 0x5, 0x100, 0x10000}}}}, {{@ip={@empty, @multicast1, 0x0, 0xffffff00, 'veth1_to_bridge\x00', 'bond_slave_0\x00', {}, {}, 0x7f, 0x2, 0x1c}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x8001, 0x9}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6, [0xffffffff, 0xff0000ff, 0xff, 0xff], 0x4e22, 0x4e20, 0x4e21, 0x4e24, 0x6, 0x2, 0xfffffffffffffda6, 0x5, 0x401}}}, {{@uncond, 0x0, 0xf8, 0x128, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x1f, 0x8, 0x5, 0x1}}, @common=@unspec=@devgroup={0x38, 'devgroup\x00', 0x0, {0x1, 0x5, 0x1c39, 0x3, 0x3c8e}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x3, 0x2, 0x8}, {0xb57a, 0x0, 0xfffffffffffff001}, 0x3e7, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b0) 03:50:51 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xff00]}], 0x10) 03:50:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x100000}], 0x1, 0x0) 03:50:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x2d, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x20000000}) 03:50:51 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfcfdffff, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:51 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x40) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x8, 0x8}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000240)="5f8c6f4172faac16d87aa65d36878425486840227f312e92d021907f78bcc918b5744d830f2a889e48affd17694f8b423312f0e316b0e772ed49a48e2b5a9f2aaedfd03ab83ed31f1879fe19b1e926673bcfec9c5dc8cddd2638d09a1479812969d179b56059f1eae91a335f"}, 0x10) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) [ 1303.223252] EXT4-fs: 28 callbacks suppressed [ 1303.223263] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1303.256446] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:50:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x700}], 0x1, 0x0) 03:50:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xac0d, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1303.279409] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x4c}) 03:50:51 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x10) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x65, 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x40, 0x0) fanotify_mark(r0, 0x40, 0x40000010, r1, &(0x7f0000000100)='./file0\x00') mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x4, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000280)="8e763aa3e794e6faab8fe7b0a0") syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x7, 0x0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1303.352834] EXT4-fs (sda1): re-mounted. Opts: 03:50:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x6}], 0x1, 0x0) 03:50:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffdfc, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1303.491513] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1303.564446] EXT4-fs (sda1): Unrecognized mount option "L" or missing value [ 1303.641034] EXT4-fs (sda1): re-mounted. Opts: 03:50:52 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfffffffe]}], 0x10) 03:50:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1c00000000000000}], 0x1, 0x0) 03:50:52 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x7a, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:52 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x1, 0x80000001}) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:52 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x1a0}) 03:50:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1304.169244] EXT4-fs (sda1): re-mounted. Opts: 03:50:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x2000000}], 0x1, 0x0) [ 1304.189454] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1304.205910] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1304.222066] EXT4-fs (sda1): Unrecognized mount option " " or missing value 03:50:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x10000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:52 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xdac, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xa000000}], 0x1, 0x0) 03:50:52 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xfeffffff}) 03:50:53 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x100020, &(0x7f0000000040)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1304.448958] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:53 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x2]}], 0x10) 03:50:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x3f00}], 0x1, 0x0) 03:50:53 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x10, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:53 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0xfffffefffffffffd) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f00000033c0)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xffffffff, 0x40) recvmmsg(r0, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000080)=""/61, 0x3d}, {&(0x7f00000003c0)=""/181, 0xb5}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/255, 0xff}, {&(0x7f0000001640)=""/246, 0xf6}, {&(0x7f0000001740)=""/250, 0xfa}, {&(0x7f0000001840)=""/185, 0xb9}, {&(0x7f0000000100)=""/48, 0x30}, {&(0x7f0000001900)=""/216, 0xd8}], 0xa, 0x0, 0x0, 0x100000001}, 0x7fff}, {{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000001ac0)=""/126, 0x7e}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000001b40)=""/129, 0x81}, {&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/10, 0xa}], 0x5, &(0x7f0000002cc0)=""/240, 0xf0, 0x101}, 0x4000000000000000}, {{&(0x7f0000002dc0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002e40)=""/84, 0x54}, {&(0x7f0000002ec0)=""/132, 0x84}, {&(0x7f0000002f80)=""/58, 0x3a}, {&(0x7f0000002fc0)=""/220, 0xdc}, {&(0x7f00000030c0)=""/11, 0xb}, {&(0x7f0000003100)=""/147, 0x93}], 0x6, &(0x7f0000003240)=""/29, 0x1d, 0x4}, 0x40}], 0x3, 0x41, &(0x7f0000003340)={0x0, 0x1c9c380}) 03:50:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xfcfdffff00000000}) 03:50:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x2000}], 0x1, 0x0) [ 1305.134839] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x200000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x3f00000000000000}) 03:50:53 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x2}], 0x1, 0x0) 03:50:53 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) kexec_load(0x0, 0x0, &(0x7f00000004c0), 0x150000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000700)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) r2 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @remote}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000a80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0}, &(0x7f0000000b00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0, 0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) lstat(&(0x7f0000000d80)='./file1\x00', &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() getgroups(0x3, &(0x7f0000000e40)=[0xffffffffffffffff, 0xee00, 0x0]) getresgid(&(0x7f0000000e80), &(0x7f0000000ec0)=0x0, &(0x7f0000000f00)) lstat(&(0x7f0000000f40)='./file1\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001000)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x1, r1}, {0x2, 0x2, r2}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1, r5}, {0x2, 0x7, r6}, {0x2, 0x3, r7}, {0x2, 0x4, r8}], {0x4, 0x1}, [{0x8, 0xfe303a6008210aaa, r9}, {0x8, 0x3, r10}, {0x8, 0x4, r11}, {0x8, 0x4, r12}, {0x8, 0x6, r13}], {0x10, 0x4}, {0x20, 0x5}}, 0x94, 0x1) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="692aede4ff697461622f612c00"]) r14 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$binfmt_misc(r14, &(0x7f0000000040)={'syz1', "f3b25fa9485884917586e449e5101f2114242b6db3e0d88079d12aa8379c999b1039c89bae441c6a1e32d811b67e2582f4aa689675f20ed36ae324d4953c7a4a4e7975ae82a78b09b999b919a02e142173365437d875429cf1ac4cf2a877c42866c81b2a04d6a42af52c0f619c5f78180446f7"}, 0x77) 03:50:54 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14142000000000]}], 0x10) 03:50:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x11000000}], 0x1, 0x0) 03:50:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x1f00}) 03:50:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf83f00, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x7000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x40000000}], 0x1, 0x0) 03:50:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x3, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1306.001297] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xfffffff5}) 03:50:54 executing program 0: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x6, 0x400) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000140)=0x3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x801, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2400}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0x104, 0x33, 0x0, 0x70bd28, 0x25dfdbfb, {0x19}, [@generic="65493b244871e6942c2c3092836910b342ff5082de31aec7690fd12686f4900a9e47ae1c47e5a0e24cbbcc388fab5c743d4ba1e3e958f28df128885d4ed8ec506925c95c7a2c3b8bfda2f3b41c8a4d43836aea2420876beacc81c1960c5aa86a3823c0deb0f2d848d9897ff082141168a93e6d866f1c3af38263196a763004c63c7a3b09b70f6a077aba65fcbdd317c222622e00b98eda0f4e3093ff61e9c47ff100ee8a1c35a530fb9889975a67d90de62e4ae98577d0602094c425fae2c30cf577511b83191828cffad1d0903d4e9ed750ad6e05a2155bff50110a2daea8f119c02308b1762266f618630de2"]}, 0x104}, 0x1, 0x0, 0x0, 0x80}, 0x4004805) syz_mount_image$ext4(&(0x7f00000001c0)="0100", &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x100020, &(0x7f0000000080)={[{@nombcache='nombcache'}]}) 03:50:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1100}], 0x1, 0x0) 03:50:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1f00, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:55 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x40000, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000680)={0xf, @pix={0x420d, 0x7f, 0x7f47575f, 0x3, 0x4, 0x48, 0xe, 0x40, 0x1, 0x7, 0x1, 0x7}}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) sendto$inet6(r0, &(0x7f0000000900), 0x0, 0x800, &(0x7f0000000940)={0xa, 0x4e21, 0x3, @local, 0x4}, 0x1c) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) mount$9p_tcp(&(0x7f0000000780)='127.0.0.1\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='9p\x00', 0x90820, &(0x7f0000000840)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_client='access=client'}, {@cache_loose='cache=loose'}, {@debug={'debug', 0x3d, 0x5}}, {@afid={'afid', 0x3d, 0x4}}, {@mmap='mmap'}, {@access_user='access=user'}], [{@fsmagic={'fsmagic', 0x3d, 0xd2}}, {@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'ceph\x00'}}]}}) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0xffff, 0x4, &(0x7f0000000240)=[{&(0x7f00000003c0)="3483371bcbc21e7f586152914fec7177c4a1bde5c667c104816d122073b1ba01dbb8c59c9c6a18be3d70c2afcf67efab4a2c42dc8402780dd1435ef80d648d5137105b04bb05cfcd9becb923e954bc3285d265a3d508fe59d34d8a802a5fe38b5653a201abb2bcad5485be8f5cb622b41c0916a744ac1b1c320ba445263972ce72e22d5206f8270658a534974029ea7e5805903205057a40f49cc161dc8437f74392dfb7bb216bb80f4fba0f9cb03a05ee", 0xb1, 0x100}, {&(0x7f0000000100)="87a90196d131e724561c18bcb1346e4c133859ee3e42e0c384aa28a4e2a63ebf0a562592117a64", 0x27, 0x7}, {&(0x7f0000000480)="e1936839b2381230bd07f2db72c2224a9ca250326cd077e10801cba553d02138529dd38799c2e0c2614d16fe0bf659f3b7614267b236ea2922106aaa31c453f55c6c6640c32673ee620d95074449a39b4896d5e548ae6b50f56dc87c86a53e7a4661ff4c5e57a0b299a9f6ef31e836615104fc6c66e8a43f10b7802d0de5da25e0c7dd951e720dffd33bf3844e677ef53dffe233cda858069e74fca4996c34786b0bf7f5af4c03cf499f1db94fa9ebdb23e2f2771bab130e9edf717afe87c6104c4f442b9aff", 0xc6, 0x7}, {&(0x7f0000000580)="44a15b3b246122b9db1ec1740b226fab5899d536ab2c4ee57bd1dbe8f78e5d97d222adf14164d65abc1c3ffc6e9d93f85837e20828848a4725809b979a1b47b880df7620496d751fe083fbb535d752fc068647447e655c28e3219365221af3754ea1f1c890eb715fea6f4fc8046372fe5b076421650933817359f2db9832d1a14a2760d7017cbeb98874527125f86cd0", 0x90, 0x3}], 0x80, &(0x7f0000000140)='securityuserself]}ppp1!\x00') syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB='init\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 03:50:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x2000000000000000}], 0x1, 0x0) 03:50:55 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x8000000000]}], 0x10) 03:50:55 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x10000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x74}) 03:50:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3ff7f8, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xfe800000}], 0x1, 0x0) [ 1306.889227] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x6c00000000000000}) 03:50:55 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:55 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8000, 0x101000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000e00)=0x3) recvmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f00000004c0)=""/171, 0xab}, {&(0x7f0000000580)=""/199, 0xc7}, {&(0x7f0000000240)=""/78, 0x4e}, {&(0x7f0000000680)=""/218, 0xda}, {&(0x7f0000000780)=""/109, 0x6d}, {&(0x7f0000000800)=""/229, 0xe5}, {&(0x7f0000000080)=""/6, 0x6}, {&(0x7f0000000900)=""/17, 0x11}, {&(0x7f0000000940)=""/215, 0xd7}], 0xa, 0x0, 0x0, 0x8}, 0x100) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000e40)=0x4) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0xe1, 0x2) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000cc0)=0xe8) lsetxattr$security_capability(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000d00)=@v3={0x3000000, [{0x8, 0x8}, {0x3, 0x200}], r1}, 0x18, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000d80)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d40)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000dc0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x1b5ac0, @mcast2, 0x7}, r2}}, 0x30) 03:50:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1c000000}], 0x1, 0x0) 03:50:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffdfd, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x6000000}], 0x1, 0x0) 03:50:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1000000}], 0x1, 0x0) 03:50:56 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x700000000000000]}], 0x10) 03:50:56 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0xa0008000}) 03:50:56 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x3f000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:56 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xfff, 0x200000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000001000/0x2000)=nil, 0x2000}, &(0x7f0000000240)=0x10) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0x15}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="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", 0x2b7}], 0x1, &(0x7f0000000e00)}, 0x8000) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000300)) socket$inet6(0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1, &(0x7f0000003b40)}, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="61626c652c00000000000000007fc470831c669db7dd3ae2bcdb246f86bfce2cc06f6385fa398dbcdb36dd1bac1d191833499b4744b6ec33ec0c39fcee"]) 03:50:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xe000}], 0x1, 0x0) 03:50:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x40000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:50:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x8}], 0x1, 0x0) [ 1307.789327] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:56 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x8000a0}) 03:50:56 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x1f000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:56 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x280, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x7) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x900000000000000}], 0x1, 0x0) 03:50:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x9000000}], 0x1, 0x0) 03:50:57 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x40000000]}], 0x10) 03:50:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100007, &(0x7f0000000100)) 03:50:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x7000000}], 0x1, 0x0) 03:50:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x7400000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = getuid() mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x802000, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0xbe43}}, {@mode={'mode', 0x3d, 0x1f}}, {@mode={'mode', 0x3d, 0x7ff800000000000}}, {@mode={'mode', 0x3d, 0xff}}, {@mode={'mode', 0x3d, 0x20}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0xffffffffffffffff}}, {@mode={'mode', 0x3d, 0x40}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'init_itable'}}, {@uid_lt={'uid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x65, 0x77, 0x35, 0x75, 0x79, 0x3b, 0x33], 0x2d, [0x35, 0x7b, 0x77, 0x67], 0x2d, [0x7b, 0x77, 0x77, 0x34], 0x2d, [0x7d, 0x0, 0x65, 0x33], 0x2d, [0x7b, 0x37, 0x33, 0x0, 0x34, 0x66, 0x75, 0x65]}}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfsfloor={'smackfsfloor'}}]}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x800) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x5, 0xff}) 03:50:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x2800000000000000}) 03:50:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xfffffffffffff000}], 0x1, 0x0) [ 1308.661049] EXT4-fs: 25 callbacks suppressed [ 1308.661067] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1308.679627] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1308.689728] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x1f00000000000000}) 03:50:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100006, &(0x7f0000000100)) 03:50:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xac0d000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1000000000000000}], 0x1, 0x0) 03:50:57 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) userfaultfd(0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="696e827409000000626c652c001317b22edbaa1e4ac55cdcb72fd2713df8249b464c09cfa32cad167d3d0c117a0ef6aa3d8e2f8dc0ec"]) [ 1308.886350] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1308.943736] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:58 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x5000000]}], 0x10) 03:50:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x200000000000000}], 0x1, 0x0) 03:50:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [], 0x4c00000000000000}) 03:50:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10801b, &(0x7f0000000100)) 03:50:58 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4c00000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:58 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/70, &(0x7f0000000080)=0x46) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f00000003c0)={0x0, 0x0, @ioapic}) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x3000000}], 0x1, 0x0) [ 1309.551971] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1309.554775] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1309.567770] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:50:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10400e, &(0x7f0000000100)) 03:50:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) mkdir(&(0x7f0000000100)='./file0\x00', 0x182) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:50:58 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file1\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000240)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x3c7, 0x101) mount$bpf(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001004, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xe000000000000000}], 0x1, 0x0) 03:50:58 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x40000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1309.795569] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1309.828604] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1309.885587] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:50:58 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x7a00]}], 0x10) 03:50:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x80fe}], 0x1, 0x0) 03:50:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c002, &(0x7f0000000100)) 03:50:58 executing program 0: setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:58 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x200000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x9, 0x8, 0x40, 0x7, 0x0, 0x6, 0x8, 0x2, 0xa1, 0x4, 0x400, 0x5, 0x6, 0x0, 0x8001, 0x80000000, 0x2, 0x4, 0x1f, 0x10001, 0x7f, 0xfffffffffffffff8, 0xfffffffffffffffb, 0x81, 0x6a, 0x5, 0x10000, 0xffffffff00000001, 0xfff, 0x9, 0x9, 0x0, 0x72, 0x1f, 0x1, 0x6, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0x2}, 0x20820, 0x401, 0xfe2e, 0x0, 0xd059, 0x9, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000001c0)=0x1) r1 = syz_open_pts(0xffffffffffffff9c, 0x406400) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000280)={0x0, 0x4, 0x1}) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:50:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1100000000000000}], 0x1, 0x0) [ 1310.447547] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1310.459747] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:50:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x1000f3, &(0x7f0000000100)) 03:50:59 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x5000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:59 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000040)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:50:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x300000000000000}], 0x1, 0x0) 03:50:59 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="6a71666d001074568d40312c002d843dc9789fe8cb558d4cd84ad6d00ad56b6da4f23628ab72d6ec43ba1e5827b427f772c79934a8f383e1d832dc437c5316f66306515e53d199a701"]) 03:50:59 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfc]}], 0x10) 03:50:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x700000000000000}], 0x1, 0x0) 03:50:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104019, &(0x7f0000000100)) 03:50:59 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x1000, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0x7, &(0x7f0000001780)=[{&(0x7f00000003c0)="f17d537712809f067be87735c41408b3dfd8ea41d4c840a47381a5a9dd0069985442744a9aa3d4e7196d9e9b648406dfe4b22df5ecdb8b630d24ead4d51acbf594f87424719bd07b90b50c8ca3ecc371f2f51dd4499b89d37f20433849be5607164236a813ba85ae11b4cfcbe2aac69cb6369a19fda0bd2ac01101348fc899ab290e8cea633697949f040f41aaf23caad6ef2af0cbde73a0b70d6f460ac8ee50ac2b9d81abb034424d68390c6a91781428fb4b97dc61055648241e1898fece153b7a84001bdd68030885f192ab02b05c17ed5e8b0757d319565b0f968024d008bbf331c5a8e9fe243699273a108b160fe06526bf28", 0xf5, 0x5c7}, {&(0x7f00000004c0)="c5074069cc0a63ef40aea0134192d19272e86356ccc964e8e879c35fe1c7aa5aae06240da6f783ec9d261f699bae4a8f950fd8d93e13ea92e750fd823c7233d009c6f41d0565a8c79a21c5e4280ffbe640a073c4d09af3d34dd0b5d8dc717ed1df6e8a0386fd335a572f9c4a7c4c60dca1cd731feed7e52bc3a7364f1517ec7a69c9634c17570ab23739b7bb3fc2be565a9798f170051664723e0b3d2ed770af53f0aead286ea47bd798bed78cb023e12255a4c529f958617b4b3273f75d8861c87ed63c1abad0043cba8e1081843a94c858486e26b86257d1e8037c7a9165b7e926b53e22812ccc0d9092a05413c673", 0xf0, 0x4f1}, {&(0x7f00000005c0)="d72904bd3809719479b9228bc80aff18f7b9a210d5d7917e55e7a1407a1230cb430f3ee1e3fb0fb36294fd72db26b4b5e644640835c57e6f04885c7bdf7cab42ed823dc49ec458be7518e199c8e8c2d3a26480a80b6c2dba8f10ef1ab677d7bea5c46763b1f0d8bdf3ead6513af94f3548eb9df07a31b0b758ccd84f3ed7cdd9d546287db5f931e341bdba92accd453045d1b39a1dcc5f1bf65939f3e26dbf5b238c91598eb3eb520cbc620bd591f4284b97e0", 0xb3, 0xfffffffffffffffe}, {&(0x7f0000000680)="c4f878fbf8dbf7204a062af8658c4cd8e47f0773301afe55a1232418fe19ef3abb77fbc54ebcc39f4a1ee5bed6e533d15c4ff7f6d5f744276dce108ed850a50900f4cd841bffd8ab1d0216202b9962a7605b37c7c1ede39395354c316ddf109684911f5323360f52a1deea120c0356037fa97e1ab6bdd6bb40913f12fc11ed9b5446f57c0fc57dc488d93e8172a0c931457a04b244692792c8daada4bee435414d451851c137e065e398d1736e245b1a5309f62578d2e75738f624d93b14c0b33b3a2273129429b3474b2837d5c4ffc35b3bdbfded4270f4720c4b090abc80d1a424931e42b28243e76a27935339fbbee1ba7d8f8540", 0xf6, 0xaad}, {&(0x7f0000000040)="df2262aa0028095eed7a512c4c9480291e50a7984358448127a7f76b857b24be1042aea9803015421c8ded7b4b3147446dae357c0afb865da0787d56c85538e8c0c2360212261c981c22013c867914ae7ccc6542f28c", 0x56, 0x5}, {&(0x7f0000000780)="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", 0x1000, 0x1}, {&(0x7f0000000100)="be303bb10cb1a1066c6d03620ef94ea8391faf4139fb8dc5ae1817d41de8520a95156d0db6fe36b4821944f33372d99634ac86734346a281072d3b5cd8d10d7b3c3c5e1e6edac10422348fddaa08e8f1b6ece482e1afaabe62d269b1b33ac5cc2d7dbec0a0", 0x65, 0x2}], 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) restart_syscall() 03:50:59 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x6c, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:50:59 executing program 2: statfs(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000280)=""/180) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:50:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x3f00000000000000}], 0x1, 0x0) 03:51:00 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x6, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:00 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108010, &(0x7f0000000100)) 03:51:00 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:shell_exec_t:s0\x00', 0x22, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000080)={0x2, 0x7fff, 0x7}, 0xc) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1311.374994] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYPTR64, @ANYPTR], @ANYRESHEX, @ANYRES16], @ANYRESHEX, @ANYRESHEX, @ANYRESHEX]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/exec\x00', 0x2, 0x0) 03:51:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xfffff000}], 0x1, 0x0) 03:51:00 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xa1414ac]}], 0x10) 03:51:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x600}], 0x1, 0x0) 03:51:00 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x6, 0x101000) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001600)='/dev/rfkill\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = syz_open_dev$audion(&(0x7f0000001480)='/dev/audio#\x00', 0x8, 0x800) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001640)={{{@in6=@remote, @in6=@remote}}, {{@in=@multicast2}}}, &(0x7f0000001740)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000240)='./file0\x00', 0xd3de, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="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", 0x1000, 0x6}], 0x4000, &(0x7f00000013c0)={[{@stripe={'stripe', 0x3d, 0x5}}, {@data_journal='data=journal'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@data_journal='data=journal'}, {@block_validity='block_validity'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@audit='audit'}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, 'systemtu:object_r:netlabel_mgmt_exec_t:s0\x00'}}]}) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000014c0)) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000080)={@ipv4}, &(0x7f0000000100)=0x14) 03:51:00 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xa0008000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:00 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c01e, &(0x7f0000000100)) 03:51:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x400000, 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)={0x19, 0x17, 0x1, {0x10, './file0/../file0'}}, 0x19) ioctl$UI_DEV_DESTROY(r0, 0x5502) write$P9_RAUTH(r0, &(0x7f0000000540)={0x14, 0x67, 0x2, {0x33, 0x1, 0x2}}, 0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x8868, @mcast1, 0xffffffff}}, 0x1, 0x101}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e20, 0x9cf, @local, 0x7ff}}}, 0x84) setxattr$security_smack_transmute(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000500)='TRUE', 0x4, 0x2) 03:51:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xfffffff5}], 0x1, 0x0) [ 1312.259665] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:00 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xa0010000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:00 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104008, &(0x7f0000000100)) 03:51:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 03:51:00 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000003c0)) open$dir(&(0x7f00000004c0)='./file0\x00', 0x290000, 0x20) mount$9p_xen(&(0x7f0000000080)='-\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x60008, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=xen,posixacl,loose,uname=mime_type\\\',access=user,uname=/dev/rfkill\x00,version=9p2000,fsmagic=0x0000000000000006,fowner>', @ANYRESDEC=r0, @ANYBLOB="0100"]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x800, 0x0) write$binfmt_elf32(r1, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0xfffffffffffffef4, 0x80000000, 0x9, 0x4855, 0x3, 0x3e, 0xfff, 0x285, 0x38, 0x28f, 0xfffffffffffffc00, 0x8, 0x20, 0x1, 0x4, 0x53, 0x1}, [{0x70000000, 0x7, 0x101, 0x7fff, 0x1, 0x7, 0xfff, 0x6}], "3d01656a3bf34532beefda2dc9ae8f90a1520991c80eaff85659ee7c2941b63a0ff217a9605f4ce542c4e4d65a0df970bc244b9ea1f6a6c9ea899ee22db17443ba3aec6c380b00d7f9d5ad099507ee9a6ce888cf85fccce47fd5520b98922f3d3e83e3a09fc28a9042f6541ab6c7213c712139f5515238ce7135470c6c5f9e53a7835f7318f2e253f9", [[], [], [], []]}, 0x4e1) ioctl$NBD_DO_IT(r1, 0xab03) 03:51:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xf0ffff}], 0x1, 0x0) 03:51:01 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x7000000]}], 0x10) 03:51:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xffffff7f}], 0x1, 0x0) 03:51:01 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x1f00, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10800c, &(0x7f0000000100)) 03:51:01 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='ppp0\x00', 0xffffffffffffffff}, 0x30) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000140)="6c6fe1566e75696400") getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f0000000240)=0xd9bcfc78d74ddeca) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xfe80}], 0x1, 0x0) 03:51:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x2000, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000280)=@hci={0x1f, 0x0}, &(0x7f00000001c0)=0x80, 0x80000) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=@newtclass={0x584, 0x28, 0x3, 0x70bd26, 0x25dfdbff, {0x0, r1, {0xd, 0x10}, {0x0, 0xf}, {0x4, 0xf}}, [@tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x8, 0x5, 0x74}}}, @TCA_RATE={0x8, 0x5, {0x3, 0x100000001}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x2c, 0x2, [@TCA_QFQ_WEIGHT={0x8, 0x1, 0x5}, @TCA_QFQ_LMAX={0x8, 0x2, 0x2}, @TCA_QFQ_LMAX={0x8, 0x2, 0x8001}, @TCA_QFQ_LMAX={0x8, 0x2, 0x101}, @TCA_QFQ_LMAX={0x8, 0x2, 0x4c59}]}}, @tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x24, 0x2, [@TCA_HFSC_USC={0x10, 0x3, {0x2, 0x100000001, 0x7ff}}, @TCA_HFSC_RSC={0x10, 0x1, {0x3, 0x3, 0x8000}}]}}, @tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x8, 0x5, 0x6cb4}}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x488, 0x2, [@TCA_CBQ_FOPT={0x10, 0x3, {{0x0, 0x4}, 0x0, 0x8}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x2, 0x62, 0x4, 0x3, 0x2, 0x4db, 0x8, 0x3, 0x80000000, 0x3, 0x1, 0xffff, 0xffffffffffff01e5, 0x3, 0x5, 0x8, 0x400, 0x233, 0x1f, 0x9, 0x1fb, 0x6, 0x7, 0x7, 0x7fffffff, 0x8, 0x5, 0x14bd, 0x1ff0000, 0x3, 0x8001, 0x9, 0x8, 0x3, 0x0, 0x3, 0xffffffffffffffff, 0x924, 0x4, 0xffff, 0x400, 0x2, 0x9, 0x3, 0x6, 0x3, 0x800, 0x10000, 0xff, 0x1, 0x1, 0xc992, 0x23, 0x0, 0x971f, 0x800, 0x3, 0x401, 0x7f, 0x7f, 0x31, 0x7a21, 0x7, 0x2, 0x6, 0x4, 0x29, 0x96a3, 0x40, 0x1, 0x579, 0x81, 0xd5, 0x8, 0xc00000000, 0xfffffffffffffc00, 0xf648, 0x1, 0x7, 0x9, 0x80b4, 0x3e9e, 0x5, 0x2, 0x3, 0x0, 0x10000, 0x7, 0xfff, 0x5, 0x800, 0x3, 0xf79, 0x1, 0x8001, 0x800, 0xffffffffffff0000, 0x80, 0x3ff, 0x81, 0x2, 0x800000000000, 0x1f, 0x6, 0x7, 0x1, 0x4, 0xca0, 0xc10, 0x5, 0x7, 0x0, 0x1, 0x8, 0x1, 0x4, 0x1f, 0x9, 0x1ff, 0x100, 0x100000, 0x4f8b, 0xdb, 0x0, 0x9, 0x1, 0x7, 0x7fffffff, 0xffff, 0x1f, 0x8000, 0x400, 0x4, 0x280, 0x6, 0x5, 0x8, 0x200, 0xc3c3, 0x127, 0x4, 0x7, 0xb8, 0x1, 0x8, 0xffffffffffffffff, 0x1, 0xfc, 0x1, 0x80000000, 0x2, 0x8000, 0x0, 0x1f, 0x115, 0x1, 0x4, 0x401, 0x1000, 0x6, 0xd3, 0x1, 0x80000000, 0x80000001, 0x5900, 0x0, 0x5, 0x0, 0x400, 0x1, 0x8e6, 0xffffffff, 0x6, 0xe69, 0x5d, 0x7, 0x8001, 0xfffffffffffffffd, 0xffffffffffffffff, 0x40, 0x8, 0x1, 0x3, 0x1000, 0x5, 0x3, 0xcc0f, 0x2, 0x48, 0x4, 0x80000001, 0x40, 0x86a, 0xfffffffffffffce8, 0x9, 0x5, 0x8, 0x81, 0xffff, 0x7f, 0x4929, 0x80, 0x7ff, 0x1ff, 0x7fffffff, 0x0, 0x4, 0xffffffffffffff94, 0x8, 0xff, 0x1, 0x9, 0x3d17, 0x14c6, 0xffffffff, 0x9, 0x7f, 0x40, 0xe781, 0x3, 0x3, 0x5, 0x4, 0x8f1, 0x9, 0x1, 0x4, 0x5, 0xff, 0x1, 0x7, 0x8, 0x9, 0x2, 0x4, 0x4, 0x5, 0x200, 0x8, 0xc2, 0x6, 0xca, 0x5, 0x7, 0xc473, 0x101, 0x8, 0xff, 0x200, 0x40, 0x7fff, 0x7ff, 0x100000001, 0x6, 0x4, 0xffffffffffffff90]}, @TCA_CBQ_FOPT={0x10, 0x3, {{0x0, 0xfff2}, 0x6, 0x4}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0xfff, 0x3, 0x2, 0xaa, 0x5, 0x2}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x8c5, 0x3, 0x3, 0x1, 0x100, 0x8}}, @TCA_CBQ_RATE={0x10, 0x5, {0xffff, 0x0, 0x80cc, 0x5, 0x8000, 0x101}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0xffff, 0xffff}, 0x10000, 0x4}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x7, 0x1, 0xff, 0x6, 0x4f9, 0x1}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x40, 0x0, 0xfffffffffffffff8, 0x0, 0x3, 0x3ff}}]}}, @tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_MASK={0x8, 0x4, 0xcb}}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x14, 0x2, [@TCA_CBQ_FOPT={0x10, 0x3, {{0xffee, 0xfff3}, 0x1f, 0x7}}]}}]}, 0x584}}, 0x4000) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1313.166754] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c003, &(0x7f0000000100)) 03:51:01 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x7, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:01 executing program 0: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x10000000000000}], 0x1, 0x0) 03:51:02 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x3]}], 0x10) 03:51:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x100000000000000}], 0x1, 0x0) 03:51:02 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xf5ffffff00000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c01f, &(0x7f0000000100)) 03:51:02 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@nat={'nat\x00', 0x1b, 0x5, 0x630, 0x560, 0x0, 0x0, 0x278, 0x3e0, 0x560, 0x560, 0x560, 0x560, 0x560, 0x5, &(0x7f0000000280), {[{{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x3, 0xffffffffffffffff, 0x100000001, 0x0, 0x3}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0xa, @ipv6=@loopback, @ipv6=@ipv4={[], [], @local}, @gre_key=0x53, @port=0x4e21}}}, {{@ipv6={@mcast1, @ipv4={[], [], @multicast1}, [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffff00, 0xffffff00, 0xffffff00, 0xff], 'ip_vti0\x00', 'nr0\x00', {0xff}, {0xff}, 0x3c, 0x8, 0xe7e153f9f5e4052c, 0x8}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@inet=@socket3={0x28, 'socket\x00', 0x3, 0x2}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@loopback, @icmp_id=0x64, @port=0x4e24}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x99, 0x10000, 0x4, 0x1, 0x80000000, 0x212, 0x1002}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x2, 0xe2, 0x1}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv4=@local, @icmp_id=0x64, @gre_key=0xf44}}}, {{@uncond, 0x0, 0x138, 0x180, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0xaf, 0x5, 0x1, [0x9, 0x6efa, 0x9, 0x100000001, 0x6, 0xfffffffffffff800, 0x7, 0x1, 0x5, 0x8, 0x6, 0x0, 0x5, 0x9, 0xffffffff, 0x20], 0x9}}, @common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0xf7, 0xa1}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00', 0xba}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x690) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000080)="69fc20d5b7", &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x1, &(0x7f00000001c0), 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="01"]) 03:51:02 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2000ffd, &(0x7f0000000100)=ANY=[@ANYPTR, @ANYRES32, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESDEC, @ANYPTR64, @ANYRESOCT, @ANYRES16=0x0], @ANYRESOCT=0x0]) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000380)={{0x2, 0x0, 0x1, 0x1e6ac00, 'syz1\x00', 0x66427ed5}, 0x1, [0xb74, 0x3, 0x8, 0x1, 0x0, 0x100, 0x5, 0xffffffff, 0x4, 0x8001, 0xffff, 0x7ff, 0xa1e, 0x6, 0x4, 0x2, 0x8, 0x5, 0x0, 0x5, 0x200, 0xf72, 0xe27, 0x1, 0x8000, 0x5, 0x4, 0x800, 0x9, 0x7, 0x8, 0x10001, 0x1, 0x143, 0x101, 0x4, 0x10000, 0x1000, 0x8, 0x3d, 0x6, 0x7, 0x80000001, 0x9, 0x0, 0x2, 0xf6, 0x0, 0x124, 0x40, 0xa98c, 0x400000000000000, 0x6280000000000000, 0x9, 0x9, 0xbb3, 0x1ff, 0x7f, 0x8000, 0x1ff, 0x200, 0x7f, 0x80, 0x4, 0x8000, 0x8, 0x27d6, 0x6, 0xfffffffffffffff9, 0x8, 0x5, 0x8000, 0x9, 0xacd6, 0x3d7, 0x8001, 0x1, 0xe5, 0x1000000000, 0x7, 0x7, 0x2, 0x0, 0x30, 0xfffffffffffffff7, 0xe4, 0x5, 0x1000, 0x5, 0x0, 0x0, 0x10001, 0x6, 0x0, 0x7, 0x1, 0xfffffffffffff53a, 0x10000, 0x4, 0x775f, 0x2, 0x10000, 0x6, 0x6, 0xfffffffffffffff7, 0x6980000000, 0x5, 0x7, 0x3, 0x8000, 0xe56, 0x4, 0x1, 0x0, 0x76, 0x8000, 0x921, 0x9, 0x5, 0x0, 0x7180, 0x2d40, 0x4, 0x6, 0x3f, 0xb72, 0x2, 0x200], {0x0, 0x1c9c380}}) 03:51:02 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001000, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xffff000000000000}], 0x1, 0x0) [ 1314.052754] EXT4-fs: 17 callbacks suppressed [ 1314.052766] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 1314.070596] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108012, &(0x7f0000000100)) [ 1314.104681] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:51:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xfe80000000000000}], 0x1, 0x0) 03:51:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) uselib(&(0x7f0000000100)='./file0\x00') mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:02 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xf8f73f00, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1314.302544] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1314.346145] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1314.359374] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:51:03 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x111414ac]}], 0x10) 03:51:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x8000a0}], 0x1, 0x0) 03:51:03 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "b9af5e3523a571ecce4813e0b6e10509de1ace7f"}, 0x15, 0x1) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=""/124, 0x7c) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000400)={{0x2, 0x4e23, @loopback}, {0x307, @remote}, 0x40, {0x2, 0x4e23, @broadcast}, 'gre0\x00'}) 03:51:03 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10801e, &(0x7f0000000100)) 03:51:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000500)="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", 0x0, 0x0) write$smack_current(r1, &(0x7f0000000140)='\x00', 0x1) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) utimensat(r1, &(0x7f00000001c0)='./file0/../file0/file0\x00', &(0x7f00000002c0)={{0x77359400}, {r2, r3/1000+10000}}, 0x100) write$P9_RFLUSH(r1, &(0x7f0000000100)={0x7, 0x6d, 0x1}, 0x7) 03:51:03 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x3f00, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0xf0}], 0x1, 0x0) [ 1314.958500] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1314.972564] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1314.982282] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:51:03 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c010, &(0x7f0000000100)) 03:51:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000080)={0x0, 0x2, 0x1}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:sudo_exec_t:s0\x00', 0x21, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:03 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4c00, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f0000000500)=ANY=[]) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000001c0)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='data_err=ignore,data_err=ignore,grpid,stripe=0x00000000ffffffff,nodelalloc,resgid=', @ANYRESHEX=r0, @ANYBLOB='0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580)={r1, 0x200, 0x77, 0x5}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000003c0)={r1, 0xffffffffffffbcfc, 0xbd1, 0x1093b816, 0x2a2, 0x2, 0x1, 0x0, {r2, @in={{0x2, 0x4e24, @remote}}, 0x100000000, 0xb3, 0x0, 0x1ffe000000000000, 0xffff}}, &(0x7f0000000280)=0xb0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000540)={0x10, 0x30, 0xfa00, {&(0x7f0000000480), 0x2, {0xa, 0x4e24, 0xfff, @dev={0xfe, 0x80, [], 0x21}, 0x26c5}, r3}}, 0x38) 03:51:04 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x68, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:04 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) symlink(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1315.866501] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1315.871647] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1315.890310] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:51:04 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100011, &(0x7f0000000100)) 03:51:04 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x1600000000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:04 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) signalfd4(r0, &(0x7f0000000040)={0xe7}, 0x8, 0x800) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:04 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:05 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac141411]}], 0x10) 03:51:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:05 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x2d000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:05 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108003, &(0x7f0000000100)) 03:51:05 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000100)={{0xffffffff, 0x2}, {0x3, 0x7}, 0x2, 0x2, 0x4}) 03:51:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x4) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR, @ANYRESDEC, @ANYBLOB="0043c61a86a0db03dcd42c84920248ff18b73ce2b7bbb936a8edc4fdfbd087b5f33f840049d43a519ab607800229d637a689df345b7a0d4278b2a4f87d983f95e38bc877099d0522f521e515600ae410cd515ce6da201cada61c9259659f6e8a3f43fdce0539fa9408c91b2b2a61d2819061a33d52b9750d01a0154d121a75a241a8b426c42cd2c251c1baa53b6da9a0bcc8b85ba9ce1ab45ec47694fd6a62794ecec86ed33ef9fd09e0bb87a5b7aa94b8ca5d3e1c4ac474880190dbc43f", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR64, @ANYPTR, @ANYRESHEX, @ANYRESDEC, @ANYRES16], @ANYRES64, @ANYRESDEC]]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000300)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, &(0x7f0000000600), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:05 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x16000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:05 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104011, &(0x7f0000000100)) [ 1316.789454] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000040), 0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x113, 0x1009}}, 0x20) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:05 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2c19, 0x102) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:dlm_control_device_t:s0\x00', 0x16b, 0xf7d1094ea07d2adb) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:06 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x100000000000000]}], 0x10) 03:51:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:06 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4c, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:06 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10001c, &(0x7f0000000100)) 03:51:06 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000280)=@v2={0x3, 0x2, 0x12, 0x7, 0x37, "1eb3c92d3886c89fc527f54ad37e6ecfe13c01aa3bd968b4d73fa80cd1b19551aba323fc17d00db78ba1e9bcebbfc0c861062257002b85"}, 0x41, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:06 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB='initle,\x00']) 03:51:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1317.710942] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:06 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10800f, &(0x7f0000000100)) 03:51:06 executing program 2: mkdir(&(0x7f0000000100)='./file0/../file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 03:51:06 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfeffffff00000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:06 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40440, 0x0) bind$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x1}, 0x10) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:07 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x9000000]}], 0x10) 03:51:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:07 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100008, &(0x7f0000000100)) 03:51:07 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x5}, &(0x7f00000001c0)=0x7a) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x4, 0x30}, &(0x7f00000002c0)=0xc) mkdir(&(0x7f0000000180)='./file0\x00', 0x9) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000003c0)={r2, @in6={{0xa, 0x4e20, 0x946c, @ipv4={[], [], @remote}}}}, 0x84) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/15, &(0x7f00000000c0)=0xf) 03:51:07 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:07 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0xfffffffffffffdfb, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$getenv(0x4201, r0, 0x1, &(0x7f0000000080)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 03:51:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB]) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0x80000000, 0x1, 0x1}) 03:51:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:07 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000240)=@ng={0x4, 0x1, "a4e9e0289230514e1c24c8f4ff5552ac6c440dea"}, 0x16, 0x1) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xff, 0x0) write$P9_RLINK(r0, &(0x7f0000000080)={0x7, 0x47, 0x1}, 0x7) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1318.629175] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:07 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x8000a0, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:07 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10400b, &(0x7f0000000100)) 03:51:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:08 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x48000000]}], 0x10) 03:51:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="6a71666d743d76667376312c00312148338e3d7b65a549bc4e93cc9433950d80866d84224d8e98fe43a3fa3d3538698c3a36ee3f3f9ecead4822035136a57c417fd5cf06fbe03b3a217c8f591bf560404abf413b191b7d1a095475"]) 03:51:08 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108017, &(0x7f0000000100)) 03:51:08 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xfeffffff, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:08 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x2) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) 03:51:08 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000003395866f5f819a7587ae308b7f0fe93f24cccb1ef224312b9537691804868479e8f9128d75379fd11246bda1760971a96e72e8d03f657fd09d818c27a7b708e808aab72e08e1ae05b815617f8c0ba74a91be39adf056ce53902401e1570d09055054d09c64d5cb6cd21c57109e7ab5fe62f00285de241e994f6b2eab1d347bf1a9f61073b6672dfd1959d1a62457f56e08f6873291cbc1c0cf1c9a757739f09a1fb9a80cec9c1dd3639c268353aaf6dba73c"]) 03:51:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:08 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10400f, &(0x7f0000000100)) [ 1319.536765] EXT4-fs: 15 callbacks suppressed [ 1319.536780] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1319.550867] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1319.566323] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:51:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f0000000bc0)=0xe8) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/dsp\x00', 0x105000, 0x0) stat(&(0x7f0000001040)='./file0/../file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000f80)='./file0/file0\x00', &(0x7f0000000fc0)='fuseblk\x00', 0x0, &(0x7f0000001100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1a00}}], [{@hash='hash'}, {@uid_eq={'uid', 0x3d, r0}}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute'}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r0}}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) r4 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0x1) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x101, 0xa, &(0x7f00000009c0)=[{&(0x7f0000000280)="eafc02cf475bf3e1b7998cc7ab96c52ced1341a54425aac3ad9477881bc9322b8b44728d61221adcd81102e78588c7d293b299978b33edc0228664dce6fa5cdda3881d330c8c8c303343a6e6584e155c1fe6203814d3fd9256ba11d556349c9be82b7ab6623c69fc27e2809d5e744c1b1992b4f44cba833b6696f3922333b1e08f0e746f80", 0x85}, {&(0x7f00000001c0), 0x0, 0x100}, {&(0x7f00000003c0)="4852c58e326c5775e1fbc73b3ca4368b1144ccba41cd60e2f30a2c81db015cfacdba5dad46ad63cef5cb", 0x2a, 0x3d}, {&(0x7f0000000400)="1d637adefa11f0332058ec45006906b334cd20be8bf1baa0049c289fe65a477b486233cb80e567dfd2a3a0b90517432f99446f723c35a8191bf584fcf2510f121b90216d843921a2e42ae46ad432265610d5f7ec69fb7e95016ce6e5f755d32ad805e04d513e42d47834dd7184d1677c49e0c87c7a244507e4d8cfecb65ca10856d3da0994a132f3fa1d3a35ad4a198ac1d79ce6bda845bc1e88f5e775db6328ee", 0xa1, 0x2}, {&(0x7f00000004c0)="99e31e24fa9cc3cda3b435f81a599d26cec8c614e771d168c4b01d08be8bdaaf0f75ca1028276d11012b6f456f274b7a5054e330b7a4c5e5884463d685d03f4070998db3bb1b7c3a9efb272d30833b3668ac39392671d97b77e7c2ddd91bf21fa2dd4c9cdbaa2ef64c4aed5e7f847be15e548f58e0051edce3e17aa8bda8e65e7199508ba8187c8fafd7a0ae31262f232d657035ed9a25c3b506c992bfcbcda75dbff0c1312aba9b4d517f61ac2208ceeb062e35a07aae68d5e5a4fde74937b8b77efb3f01edb5147498461b67", 0xcd, 0x2}, {&(0x7f00000005c0)="2ec205f1e599b9c6f8d22ca2f1e9e471e49b43e4fed2cb60f391a4013a55101cec", 0x21, 0xfffffffffffffffb}, {&(0x7f0000000600)="d1e9eb014433b8950952eb44b7d4d1d4fd65282fbcfefafc0b9fab532c7c088ccdf334b101b586376ed6ae4ebf0dfbab47a90ebc9b02fa436bce53695041cb655647848f2352768772b69a3bbde1febeb04bf5a3ad0389db9d9b199912484247c3373083222f749fbd646c9eaa98a26ce78f62a0cde1f49433d91c090a4ae324d6915aa929bdbaa032cbad0f5038f08ab86f219a15d0dc9cede436d17c3783a23b52b0ff2fc26a02a8f8d20a636a98888bc83588de64953a40ccd8ffc73079729c562827d84c2e9fa72de335f6a430eea2ea3c54", 0xd4, 0x6}, {&(0x7f0000000700)="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", 0xfd, 0x81}, {&(0x7f0000000800)="005cd5a56ac6fa16d917d5175695ed2ff27af370b5744a5e35a8a5ffe7cbc1c9484907883716017d8ffbb0f480ec72a2e31f8e5a54605ffd7b74cd5a2b2c50fd0b1e6a53262b17c47ea9c438406c93ca73b0ab072d5b46d1566d8245e2a1c85974c6c1f2f2d20826bd75ff4d8abc3340df74f93c13bdf71c3d2de8c8d00bd05e9613a9403da0d1a4d6df5d11b2da965782aea1d7bbce09c54abe6b4bd8963090199b07aed06f85bc1f74e82ab75f9dd755533adb662275ea55af2b8a44b61051f4df050102e0e615015311d370e46f0dbe9c8dbd", 0xd4, 0x5}, {&(0x7f0000000900)="7a3bf02b3e0ef5dd8cac08a64049c21b516fad2b43dd4b38f3c90e73198640236ecf4a85904827dd3a71d05f006b9361fda1291a48f69b72a58107b3df4caa940c9af8d13fe0f1a9b6dab81c43313f0c10976f5789fed0276b1d7156cd568ec3e06ef389c8cb0bf7da88f3088de0b16a718a1ace3b3960fe8835c07480c2f55128ff403be058742f32b767cd38708cc28e3bde42b4", 0x95, 0x2}], 0x1000000, &(0x7f0000000e80)={[{@suiddir='suiddir'}, {@norecovery='norecovery'}, {@quota_off='quota=off'}, {@noacl='noacl'}, {@statfs_percent={'statfs_percent', 0x3d, 0x2}}], [{@euid_lt={'euid<', r0}}, {@uid_gt={'uid>', r3}}, {@obj_type={'obj_type', 0x3d, 'jqfmt=vfsv1'}}, {@uid_gt={'uid>', r4}}, {@fowner_lt={'fowner<', r5}}]}) 03:51:08 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x2d00, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1319.762206] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1319.831057] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1319.842211] gfs2: invalid mount option: euid<00000000000000000000 [ 1319.848690] gfs2: can't parse mount arguments 03:51:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:08 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xfa556ab481bc677f, 0x0) fallocate(r0, 0x4, 0x30, 0x2) 03:51:08 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c018, &(0x7f0000000100)) 03:51:08 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0xf8f73f0000000000, 0x0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:08 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141b]}], 0x10) 03:51:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000001c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x1ff}], 0x100020, &(0x7f0000000140)={[{@errors_continue='errors=continue'}]}) 03:51:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1320.422118] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1320.442683] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1320.455230] EXT4-fs (sda1): re-mounted. Opts: errors=continue,,errors=continue 03:51:09 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c019, &(0x7f0000000100)) 03:51:09 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:09 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x100, 0x800) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000003c0)=""/4096) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) getrandom(&(0x7f0000000040)=""/110, 0x6e, 0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="696e6974ce1ab6995cee8ada8daf5f697461626c652cad497b070000001900"]) 03:51:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = memfd_create(&(0x7f0000000100)='@vboxnet0+\x00', 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f00000003c0)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000400)=r1) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={r2, 0x9, 0x0, 0x8001}, &(0x7f00000002c0)=0x10) io_setup(0x100000000, &(0x7f0000000440)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001000, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:09 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108004, &(0x7f0000000100)) [ 1320.731384] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1320.766641] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:51:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0xaaaaaaaaaaaaadd, &(0x7f0000001480)=[{&(0x7f00000001c0)="ea0501c7cf03df793f0a431b57b4a0a7c4576330a60cad49c500e62d4d4e92bb2090ae6e80eab71ab243257181b665206dcf93760ea1", 0x0, 0x7}, {&(0x7f0000001500)="04198af8725f6d3abcfdac477ee82bfafc73eb252096d82b00e8783c8af740e069d1555d0de51785fd648101ef51e9560faa17f30d2668d737bcc653d1a138653121e516efa0ed2ea871b71f7a6a76b482d790572f844e59873dccd754be4a6f448637fbf8a5dc55589390d4e744bf07835b5b1c5f2d8d39ef3810b8b348830a39fc87dd50ab41f95ae03fa68b86dc18948b0f76a0479a2ffcce38ac708baa2b677f3acbc841511da7d21701d90b16ab0d77b7904399", 0x0, 0x3}, {&(0x7f00000003c0)="8cf6927772492c5c2cad946e38a0b41e82cf2f7e9cfd4cbcd62e142f7772dec7940d"}, {&(0x7f0000000400)="4fc010b1563e08b2be3eaa72055ed84df786fcf800bbc754377b16183087ab5dc84ffd42d9ba5515cf989c8dc0e01380367f15efc1b2de017a2f5983a439d3e85740eae0bdbb0dbfa0c81e1a74a35877812119b911b0a19b66cf4b53efb1bcab8cd58bd7d47966d61b341c261d1618cbb7ff5233d4197094e59c48d077a0e84dddf552dee0894303fcb4e48fbc2f88a3152ac1174fe85ef5b487e42af0aa84b8ff7ee1a39e49f966081d7ba4591f5714beb2bdef4c1da67723e6f69bf8933fd5ee8b9220ab159e2415da31047f20273f128eda74f411d83ab3dff55705cd79e499778addd9c5358f8f8cd5a99d43874a2916e60b07efaa459ef353328ab384124ba30c5f90b30c0e99dc8c24f236ed615e1f9d98d36f2dd4d53d28cc59917cfaf0b53afaae4142f3b2ea19fc663368f21f26fd975c43833a857f3dd377c6e2da503a5e8f2fcbf5f9592ecf0047fb9d048e64ed34a5bea13a0def5ad93b0551c6f86bd8346c55d5121d1d346cc1bf4532ba2df0ee7055612f8d1f4da61e9076860573fcff7b52029c8fe10f34f59837c178ddddcb1a6a8084e366863aedc9159f29138f43193f39474cc432fb1efdd0ec8f363aa7f670ea32cb393f61ba48c045426724740fc7871d2ba5be86f328188d2f76c85ef7ffd4e9945a6168ff77c604956b216a48db559742363a517464fb071e89b09b968d0db89ac9895d86eeefc94484f725b29375865e337e62a82afb1f414871450c003fb739005bc7f0bb783e7f06f2b499ac7b4380e2b4df5c9d2b982d93248dadd1cd3885295c6329c26016878e5f9d4c7bc5536a041b3b20339d10ef80b2d16df75f02aa2abe1d20eb73edc49e164372ae716079b7625f371353494df463d8ef34a90c8d333564f36d1c0d81b870caa8c66b31c829ad0e873210ad051b63bdb159547ccbe865b46dc9808f0163be9b86272a214c0181fbdd454196c143cca0f3badba016971721acdaa85dc11b0e0f205c460666e8605d77d3147844949af88e7f5c6db973763627dc75f5838254a8e83b03d19d78ea1d98881adb2e56837153a6d10a1f26612bfbf81dfb86ff2c4fe48ff315d6156de27dde02ae7c01744342590a996d54ce77f6e700eaaad4681c5bab2555916a04dae817fb8bcc5a7ae6c671e72e23753ab9add681c510b871fe53e2615dc45bd2faa6b10d8a2c6d99678df6c06446bd36a5eea446e8b3fbdf42847905f9de374fb1540d4dd20d6236e9b3a083469da184bbf1b30e43ff88ee121a31275cf7a72f9b975c603c347e50cc0d2c01f1b005fc24d4690d61e764aa9289a652aeaa9be9acb00ace0ff3ee97635928623711a6dabc002f0c3902997738f5c8ccf8bd4b04d9e1f10c638ab1097f64828cd326b48e7fedee591aeb4093154b911beb4fc9a86bce5e9deed3604d6e1369bfe63723b2d8e7ae2844eebe999db08cee1dce51218028cce4ad31c1a723bfcec1bf4f1576282b3e234515a076830bca77363f2bdbc19f0f752f607232601c2f94b9aff2d30452ae1b90f6edc5c3c21c092a655dc6ae1ea9de9f4ec053078b609afb264eb958e9967a510e23934cfa037c1f97c520ded0eac488312541ec43c4303efa3aff3f6ccd4bcdd9ff17d0962ee403295280e0581d4c3cd723169be3e86aad85530a585ef772e7ca931c9c47d27f6bf5cc411d577179fce19a351889e8a9fdd869b9099823f893ae09320a12cb88dbef730612d054785a2e6572676d9fd55a2bf2aff846fdff8e1bfa7bb245d0b354fdd3c215b1fe9b5e354ffe456ea00de7d4b47e15354fed9f5191fcd4963d8a0be8b81e901d2945e987bb5e8d578b2d05b5e673ce5ad129a6c83fd0c78005d528a7af72eefb40b668dab0990503673831aab561029d1504f8b1b41b1b9c1f0032319a106c8c6d8a4ae77a5f186a94262850c789c2a63ba4649e7b0f37977f75711194313637ec45f7538267d6a5049ce974653c17c6d0d46e5c9a429c976819c2a9ff15e8576758172754e6de427e5d0778630c2eb7d9e25cf44821697d44452f08574eb1096b829e5564faa9920837c6292b7130c19e5a2df8c1dcba918ee28835281b0d16e6f605f5e5f3e6aa9511257d732ef7c6df9877e21c788c9894fbcc015b8e4754a639330d6bc788de46c1645afaf8967fbe6082c3e0e187ecc14eb882be612e20035ee18ee9f556fdf8759bb2c3751fc02a634783fef454552484ea50b9bf54bf6734b457d2be354a0cd9fbdc362e60dd555aa2a96ec5e5961f5387fa522130613b03d859ff232f845b063856e472f81ab5b1790881170fa558b1f5797247b18e8be8d626459fce06593ec58687bc5d745b315b98c90573a11c3bdc154f27dc263b0034e18ffa5ecc2c21c8b57d04679773f84f05ec17a8fa4ba8c3653f122ad79578311c4750adc918406c7dc1b0374784bc90c2e8b0f4ad0e28ce8b4a0a421a86268b5339ad1f7ec2cddcc3356887da62b3cf040db58a148e993b78fd548615121b6f9bf8b85c75034280200bb4ed3fc68d04c729070f5b5eb2b6309b175008f8ba421cf8f86a7096be27223bc7f95218960debc1f3082185d4640fb8d54674388491acf56561f32b7eafdd00b20552bef550afd3840406fd61d7cf9e4be05e78b48ff1a7b33485a407283b7868567f4fda556a55d4b96d0f67eef075759021609e3834670e6e9bd25d67dbed40a283b831b116f60d1fd4db81e674f976b89d2ac30c0b31cf09dad94ee5917752c4f12b34b1e9fdaa967ecd5f5363c5e991d421bedfc96405813d2173f98aee01b8667bfa17ac2b7fe72c3f895100aef8e8238c7c0f122abf56f949f89c34c761d112eef4822595d54488978477dbd81dc0ef337ada24ebebf8087296119e842b0b60f76f0fb8bd6236a0ba324bd86ebcbe58c164e268c1d399189224dbe2a2cbd9ee6225b303f9b28af9521ef34f3d49dedf481d8cf2dea79d9d32ab51d83db09b250cb067ae2582fef6eff7800b6b4706ac8bf202bb765c634bc761bcd2c735ca9fbefb7770d22fa0f5d45d89e69ca7895ade30683e60abd1b2e2ab19b2669535ba85a7213729bb64931fbcae219b41ff09b76d8983d52c582caed75e1ca359530df7cd6c7ad11666282e614938b2a7b3fff5048db10d2c2ef28405b538d5be0446869bc760e074aad9ee16ed6bd29f90444f52205d4bfa85406b0410d9bd0c6c4355e714d9189d607234250deb5ba3870c1223d61120f4a271aa6039f5df3fb433e78280c73b93e643b135fb51b0af03a1d9298b57086a2b4fe127af0c89a60443155227cb18b680a84061af25ede4e65f14ee78ecb119314cc72ee128b7c5244193182299a868bb2c366e234f2cc4c5ae407c4c5f6781f7013870178bbf5887cc3a8fb92cc386b7c1fd7e9157e9173dc359001870693d9f36b3fb80c5ae96f9a1f0eb1b293268cc578647bad287ac096e3e1654179d8baf8f12cf99aed3a193beff071c5c07d932558d85a7fc6883b7ccc287be142e059c0a2f569cc2a0092602da4b6ee286c69a3e5973f52bad65e064e4bfd02e6f4f107c3756f2daab742249750168176b6bce61c25179095075a9970661f345a921773ac11ab7843e1f95b341c40cd3bbb7726fd0fdc3ffde7014d6f2c74ce5ccbcd007b7aac0e95269167f9cf0d6b7d6f0966ad932285e0571ca91bf2465518a6fb0caa1dc957787bef7d45496140ec2f6a1c8d03e0aba4677b457bb6e3c0e85a0712dc2480ca87b3824bd1d503509c19d22b233844886487eb149311df87aff5d9e4ae5d9613423c3069fe90d041222f337f255a74bbd0f8d7642bf7cdefad0cf06ff02d81ff78223d1161fa5c479999c819e8692da05f6d94d1fb001c392b86b24f9b749576f31332376c839f89143cefb7068b93c3969296305334289cf8e57797ce972255cc1e320650c05f6f9ead3e32f39e5778e1cab7ddab6fe843d44c3977d39206e1c62a483a16472dcc45c0f4aa59b0a526a2cf21f8bb7ce761900eaaaf774863599bde3b69b71b9282d5a7796bf1ea4169289e3ae66d1bd4e22b25b31016fe90ce56a72b41f79d3fe7deeeae1e5f0afc8f01b0ecb0af72aa7340264674b290a33eafafbab9cd93c3578a26be32263be99bd577ed9fde6a9a73d73edec03dae391d22d4cc1c69b58e811317f06deab95ff4f1809231a8d61f9b52b543ffe2036d0028333ce095ae21687628cfc3d6d26274bbc47d212936b052bfa919eba0e9e1d9a5e7ea688af6a2e8619702c227849a141876ef67c77e0a961cfe305af6be87febd062cb53f14e6cbb385baf00c3a345ad08cb525e7b601c94849962f5ffd3944b2fb06a7ce2d25b8c1776182402e01dd6a01a70452923870ac9f8197afc38ccf27353f5f9d626b1fce09a29036a6ab1e3ff9e489b5a41e8977c6af4cd16117fc106ac2c23673ad4b98d81bdf353e8f25c5b1409bb806c19a79f6625a2ffa7340710b0c20ccf04fd63ec75d43749ed09125a0ed19d632621023472739bcc23a8ec276efd75eebc617d2e0a58c63602429644f7dd81eb00aa7380e14aa7bb400c860d10de77b0a170bcabcd1c103d2bf1167a378a8a7897f09b27d3babf867acea283e005f062c874c7c91d44d23e5725661910c7d7a5a7e52de3b7ba12fbd97dc5048d0edf8a7bf2cc5406d55a56b6a58e7846a48ad0cf483d8b3f5bb2d8e29bc7d0dae1720440dab6300638e987dad98a247dd01b7ea66514f73c70d06e5a4f4e0ac391387f21b4cad9c56981333971351cd758283c60f54054591612768fc672c71f0354a1513bd26a609a2db38e9f9c6d8387e222ec78197d24fef613c1055500deb66e2e5d3076b7ea0cc0ad511160f9303c79db451dfe4e966c48bd7f86c7f611a943578c537b79cb32913fe3b531cfd5d4cf323cde13d95f0cc8af42e7ac08f9165655ea7e995e62c73a5684312795d91ad6a158d672201219461b7115eb1125d464c6ad0f92070bf61d7d203826215ddeeb990906e8b5b6201eb5cf2a52b2dad662308eb816ade99665a7fb2895cf27a79c4183311e209405f69127b928c14750ff6de656abca887cc8d8002e570fa3ec75dd0a6cd548cec04688a5743708cb057f85ac2c7e84245ee919109bd7bd01400819298283adde74d46ab2244198e72a4976a91c2e9b0359dab6bb3ccf3d1a7e7fb5bee5bf6ccd55990047d9cf4dd70069b47d798f8f964900d73098a6707124df92b567fa6fd06408f8794485b3ee29129f8c41fe98779ad6b36f6386653ead04844023d0e56d9849a2bfa4bcdefcf93b0907f66c9496525fb0a29f43c112b497c36f911eff8305c6e18a8c41d857e6e9da9fbcc3e8f44a6333248470fae3c3388ae8b044057aa6c341250c60941fd3cca8fb8734f20d7c5621f7666e49905cc263db0139f8f79151a6b38136a5ad9f583db23fdcec3da54321823d33604cd1c8975e827e7e84470343a7a3b13814934f3e52d136f28da0ff9ead0c8e48d0a3ab276ada10353e365ac396d6a064cce0ca840cf6d68a8338cb8b0f409c883c72fb19bfe6a76df6b532bd51830da91f8c83bf8f7416c5a4b7dd73d9d1fe4c1df27f0f199170cb0066b85b267fa26a01a9a401468041bfd85298416aae615c0c16667295cc9558af8a116579e22aa668934e55bf138e30809b4cd7415c113f65de1b2881207391938c6621b6f79f217781e3f4f3e549080b43b218f3eb857114d0c12ef89d0b5a543d08e2baeb7a82a4261bc4dd632a0f380be6a6f657dc3568ee0609860e6093fed52c9909a46e6760e6b1ace274", 0x0, 0x4}], 0x100020, &(0x7f0000000140)) [ 1320.986739] EXT4-fs (sda1): re-mounted. Opts: 03:51:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:09 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:ifconfig_exec_t:s0\x00', 0x25, 0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:09 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffff5, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:09 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c00e, &(0x7f0000000100)) 03:51:09 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x700]}], 0x10) 03:51:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x80000, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000280)={0x800, "cdc40f16002c58443a87ec12ac56cfc8ffbe691e33d439e08088facba4dd55ec", 0x8, 0x2, 0x81, 0xc, 0x4}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1321.355184] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1321.358141] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:10 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108008, &(0x7f0000000100)) 03:51:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) lsetxattr$security_selinux(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:updpwd_exec_t:s0\x00', 0x23, 0x1) 03:51:10 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:10 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x10000002001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaac5d, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB]) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x80, 0x8000) 03:51:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:10 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104013, &(0x7f0000000100)) 03:51:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000140)={0x10001, "34adbd4a65ac464887558d0f8ec36898b18940cca2481f4525e7480c3b7f7f5c", 0x2, 0x1}) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x8000, &(0x7f0000001440)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYRES32=0x0, @ANYPTR, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRES64=r0, @ANYRES16=r0, @ANYRES32]) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@loopback}}}, &(0x7f0000000240)=0xe8) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f00000002c0)=ANY=[@ANYBLOB="6a71666d743d76667376312c0011b009da946397b95d6711465713985c02551a4c9b278f4e70f68126ebf6043138e3eb30dc62e33683f42bf077464151b82fa8ab5be8ad4998a881aea64ab236d92fa4f80e00f3a3f7e65e86ce384c66811cf8a9203e0073e2a0861372"]) 03:51:10 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x2300]}], 0x10) 03:51:10 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB='in,\x00']) 03:51:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:10 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3f00000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:10 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10000c, &(0x7f0000000100)) 03:51:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x200, 0x0) sendmsg$unix(r0, &(0x7f0000001680)={&(0x7f0000000280)=@file={0x1, './file0/../file0\x00'}, 0x6e, &(0x7f0000001600)=[{&(0x7f00000003c0)="6a4d8e8f044e66dc94e4e62dc991cf2d1d621b36f573bcee227107ac485e188e53f85938c0623e8017af60624cdbd25165bb3fbb660f7fd33b1fadb7ef24f34fbe8ca114cc67b92fa2e2840e98681f70032531f99fb476abe47a84a228f1f1915a7b9c6f1e610db35d2b9a74851e33b68d7613ddeb47f98a7d092a597d2321a493bb0f54393cfa4cb4d605112b5331d1ccd006657a5af7705db5b0490e4d0da93ecafe400e2da19d1f7c82f0f329d55161e9bb8617f7ebb8f0264d551d37da2be9267515ce8ce18a4db5b1c659377a6da5ab1767c8fec8d2ca3e4083760a761d2eea8bdc3a1f1914c3711c7ad4508bf962dc89c768925d013726efce776d932939c4ddfb045a4336caaf84b33063cae945a8604844e75af5fcab367abd160f2122ebbf8544cddd5ff7bbe518fc5891d1760f8b46985000474100c343db5813078b3375f33e3314ccafe455ca68a613b77895dd464afc0160b2e54f581c878739e458ceb4c2c2ae384f7e3910d3d4ae3f351683d94fdddd03ed70d5b23e88fdd9f3a8d7bd1fc30e9f02506094ac54c5924bce9a32c9abc3204da27abefe5811162b2187d1ee5416c5ebfdaccaedef4fecbee475929766022d09cd3917186fbd7b9bedcb7659a0763f112fd4ca87d9198f8beb3ff31e07f57aac5d180584c6d15d6aa1913882d85144d1493e7551bdfc42f46479e0a43eb0049e839d7f8eba207d067b343dc62dd47ce867dca1e54be4df802ed82e0d3daa39c003df49579a88f907ba7f80d45a7153bdb661d28663face6be2f05d9622dbdeccfb5e6230da6326b5fc129a5a7ea34573d9c420c9cb4630dfd86b9104daa047c20adf6e8c77a17d040725e294b0d99544991218eaebb5a59b008fc3287fb0d0aa572a826feb6301378e4f433c8d5ef5b24dd3218e11d9629533643dcd9e974abeaf074fb8a0a4831eece2679982db6502d1b013261dc9143b5c1b26866500fb40709fd5bcdf81aa675a5393f3a41a6058a341be364c264bf2aecab6be532af4483c8851eda97dac4b9a40782f1954aa50b26f4359b6979e2d71070c927a49affa82934dc35e663a0df3a4880e45dcd080207490a9640c8266c2014b35b1e5c4a336bcfad9bf77ce05f643a7baefc8f7ef71c93880d1082da41e21477f9c2c3c91fe3ad8dcfd8028b9f6bf2b7cb0379f4fe97532b3bcd3c5023fc37a2cb77fda6c63a83b8d5cf580f4bcd470ec48106bf746be0fd25661e625644f6acaefa5d6417a13cf2ffa0cd8905b86d49105dfa78c8f6f27da01bcda11c3d4e7933cd59ff57691ae7aa11865960a26a271e16b472e147970f6cb571d18fc322c639be38d4a522acc9aae56ae6d0911dee9359d4f797a8072a96a1eb6c1ea34a371d1a807d12d567f46332619f3c96ce97accf32c44a9d035a5b23cc87ae6cd0924f33aa14ccb716d9c6accc3c0b542f661a84034aca64c803d124b251e82853cee1073e69db9388d0066dfa86f31395becabf0f7f4770044d3f24f02b945e962aeb069755507774dff522e73cf3656a420d1e1fe85d0738c95d840748d33d763692db4d622ec6903edd339da40367d89a80134684248058e87723b75aecdeae1ae9682d16ed68f16aa5a5068a0a5e524c43c42638ca34d9a3229c978bb80b81cf76de4aca3eaf2a0023e2772d6235d2f6636824979b9965a7ac0d1f73d019c2b7c11292d520e8306e897485c243edec7dc3c3028265c6a15b85053f2affdcd3a5d9a0547a6a4fcf05d0d6b5645102d7031cfc75b54a44fe4912096bb4c570739881117b1dc4cf888d549355ab45d4d678cff583d73fdde988b657f0820dbdcc95b61a480a44b7b085fbebdb37f721679e10971cb8adf786fda26b1d2563ae8f7af16a039337dc8eeee509f9b9df9be197c025ab928c44bd00397f15ce4d642e91e6a80dc80181e37eafc124d6831bbe5a946fd34f7977d1267f956a09c4282b23b8ec5d79eff42de4efe40416bf275a5d1768e7143370e10e7b288f487c2ed64c0f178d461c77b2997b352826e7aab35cc2f0c3395181da55cd5032ab19a9e8ae6e511eeac22f524b67040c6b3127288738d7c2074111d555d4a7d6ec074a8a9b6821271a33a2c990fc528e44d35d15f403d4292d716cbd7f11ae77d1919f8c1ad066fbcd1e553ca85a9852cc673f9781bf45946c655bcee542d674e57e78ab1026f8da38f9dca7946e114ec1232b9c5fef9b01dfa25be25737e757e9db415884a891043f9e05fbfa30040a59bc32363c4a243e4e203b26da12a1919816b02e20cb7a4a7859932e73ad05ab11227cca4925e9f2c82cd995b49362231d0ed6daaf61c2d9aee2f247d7947a1c6d1d69d6e5e2c85ba4e9f4316d09e01f987555424563aece379ba850e621626572ade660d35a2effea5d5531102d728dfb546dd156280052f20ff1c0a7996af44602f24478b1b4e5336b2b07d96f2e6ef949ef4201ff65eeaf70327c8b0adb31e13a6986de5f9e59f15f0d45fc3d83de3640651c9cc24e9e57ccab6ce15188cbda077485ef72f4fe976683fcd8a57a0c32e629e768a4421ab54495ca5869c898b8c35af66ed3297b4fffab382c99ad4c3eae06c175f044157c1f6151c33dfd4ba8fcb24465711e564e748c4f0df39bc8dfda3fcac74db541f30db8c88b7d784ce77cfd28fe264f417a56332bd4dbad87a8ceef0280536de4378fed6f81a07e9a2a3e7664eb368e8b77a669fffa42b19f800bacd4d85fe65b837168e31676f399ff3456ed126b1f414a8c48a89a553730a2d6dc78478b57e6f17c40c3e0e14259011702c875c60b5fcc69d118404d0374c86e3e15fd551f2ed527990fe7bd73351e10944c596ad67a12206130f7b38a13ae0010a595e5dce476790196c12155bac5d103b1ef8d8587ffe9a7013a319433d583f012f44091dfc0b6c8cf63ecb1d54d6a0eb1204076595bc729eb9ef040b4a0035df65e900a43aee2c93c248f17e21f8bb3fac54a196196d8dce07361a5ceed4888dd14dc6ceb64a3b124a9a65668201f71c17a0ce211a75edc9e0b51e26dbb60180d4fe6f0784b56fdc799e61a7ebad46b3ee22b653d9693724497690868756b870b1d8c3abe197d9264200e4d0b5bb241d91efc9e248bce9842f5b8089bb0af6287a88cb5979aedaacc559ff048531fa115ae317e2013cb01f56743046f67d7e1b22a489faa32ceb1a8acca597082224523f8b5a0b418c968f619c7dd1bba7362d9aff8291e15ca7147626a18fcc19460f3ffc4d5b741cbaa21c433af510f23b269e9ffd08787e1ba4eaaa535da36c7c868c4b925c53aebce922e824bbb1f2cac00b0862f25c99e43a4f66a3221ff098a3c45fcfa0ba2ac28b579b85d5e3274a850bd13e8613e3245be420c2d8fd651de785009db0451f89099da23a2994e5a06da65cc2797563d293507d3faab21165686e079523077e69f2a513722491cb195d13f2640d15d07e5357284b4a16537affc7c2bd2892295cc9067bbc72ce58b8d1926d43e9132348723c07e04f018add850adf7ce3fedde097f980327a917421221790c25b5b0013a83a5e5ed2e9dee4cdce8b8c40750acbeabeb6e59e97c3f071d73ef11342581ac7f6d1d61cc4001507544bf49739a5e630b9c99aacbd39e1cb87f57abd723829f8b03069cb06811fc282fe54facf16909fa8bae19fe3874edb5cdd3d7fafcc3fbb65fa1b769cbb378f57b970041462adf3b58708de0220fbf202212d16074a442f9d6df73232f363687de429bd85ad5437fffd6300303c664d2b8e1d99bbb2ab7f4769bf8fff35d1b271aec25836e7028b83548889abe8f0ca516eacd01233122c3a9791941d4d0bc6b2b4897d7ba39e85897285391f9ee04b4c8e917472cd3ca7636ce13f73c574d071608f5e5e01ed28275b2dbc05020ab1837ae700996eba59355b271d27d7281045cde49bc492255c1fcae4e528a24e95a692366dd84e300deaa3869a5abce18260a12039cf2cdd4a23775b9127ba298f8f1fa46d451352ac8ab8ce20ddb74b3baf9ed87cfa2357806de1766048859d42670cf9f826ba301b6b4e52eac207d98e66b7e87f0c455ca058e2cbd71dd2e8d18fda4a5161bc77231a5617d4f7492f3bee4f7da233c2ed6072d86208256e1902077beda23ba0513ee2535b066cacc3f398beea7148789bce676b247182caf6dcbbd4a01ff21a2251f22676a77a448cb52a210f66fbd5bf69c7c06c75bc67d21697f03b9c619ffe82a54c4a829f3d86654cea3ed793fcd6d9499e95762514331b2d34da04c231943da56606e0ce6a6a78b9199eef7e0260606ca880b8e941353b03a9dbfa6b43e57c856a15fb38a3a2165864bbc99735183789a71654f3128d73efa48a345c189e195103c65c1b0440346f0c02a34b25aa4c2cbc335f94ffda63cc71fa337c0dcb92decbb3603e2c526ccdf34d6e03f1a5efd151ede9adb279b0cc57ca2ad7270c53722efe8fd832da3c1d837184f748ec30edb402d50ed815b630690df0da5cbb9d91dca3698944319c015c75bcb8cb3ffaf9c3f23e8dbb871fd0d63e993e873300c883e1c12cb95a4d952bd9b4829f0ed7d9fb0479c775368ed7583717b140045cd6bff29f6820cf50fbc0aec049b5d7fe80084c7abe058ab2f36983fa893f7c1e43092e95abf6c6a5c9ef8c11ecc4bd17912df0b1c8be35bce765eab022912e9af7fe3d9d06f407e8f08c26569d0ac96fef0aa3349919eeefa4e9d92d97d3dc7ca36ae78a1a67e2fed47e03e8354a41c5757ec0cb5e26b5c4af560c9b11057fe0a754da5b37bc0f2031b00dbfc5a26aeb5cc2b1dc028dc2f9fe036025bd34ff909357ec47a58e34d951ed919a57b57130cacdc0264a01c2695cc2f1b79749f476e9bbd4e08c5a13c45509e5071332dc297f083cecee278698a8fb549c77e9e7ab494baeb5466749eed6b9564bde9a288be3935bfe94158ae928e07d3a70f9c3282ef0d0fbc2f6b024de54fa6bd99ea1763538c7170d8223d7cbe963ea609bf4b951db0fb92782f82370dedbcb72250de489687ab060a1d38179690f7e2b0f16af3d08d56af555745fddf7cbe585e1faf65a6473fa04d80b9ed92c2888f69c8d6fbb398d42711f7f3ad9e3c16d2a6ead261b39e10c9e4d820f33af83c51aca88e62c7c5e8e35c99e6fdd4d458b9e7165ec89270dc39c6df812c90cab7902ab1ff05571bdea7fa4a31a5db9cdf85ad56b8837a9acdf593302237edc21eeb2f5cec3349029db2a8a3531755f653cdc429521331c1b68e067bddf364f3c6215dfc4bbf432697b184193548bf56a578d1cd9b8fc36355b67bf181546a1e32e72ebed9ab9e12333306e51a86c9a6474825d29b0dc31c5ded3d8ade18eeb45d4c8943c3253d8a1515c3f1f253341a51bb6a096ee7d441a9d74afa1c9faaf781953a525d6676a29a769baef69ad531e911e3ae6efab42819cdf2ce34bb7150e7d25893ed0b54d03dc1ad428075f87ed723dcd9a0d7807b44c48fcd172a45cdd4aaca68cf02f49ce8c0365f24cffbfc0708ad7e11a141d2d274d6b8685d4c7fe681ccc0c5cebc7c513b8a356e89eef634883cc1a0efaf9a557036e94470436e764cb37520ef31f34c7473c31d6a281c55738f3bb4441f45c8802e04ee48882fb77415c233d750d785325ef87ef90430f02047fca207ea60f6c08db3a9157ec1b288c8dad6c10e97ddbea9b996902d83b3be3e41cb86879076d34f3d8ad6a5e51fbbd77d4126cb1125239e79c03ea73f35906a4bebb3b8fc49078e3d7c82088dd1c059d4cdf3a2bf96104", 0x1000}, {&(0x7f00000013c0)="8250fb57b47b300969c269bdbcf4a317492a8e8f8ae16315e07b3d44939050c2a0b180e81bc60073097c65115f3dabf4f0c2714e0d3287ece888c0dbce412042518028506fba8a1558a9fa2f2ed6e76cb50e3eec7fa0861f22ea87237cc1cb637da0ad844a17c267c15fc1caebc3422f14c7775ae4113bd6", 0x78}, {&(0x7f0000000140)="177783a96d2ac5a411d2795d6d47d42bd214ca4c65852547df21c1dae8c0a0829252a04f2c32cd0e99e9a648ac6582d114c01d0251fb3bbc11ad236f", 0x3c}, {&(0x7f00000001c0)="918e11abf5984b25e476fdf715e516bdc9d70eedbf184624c6ee30b2a85049925532f76a244d0dd09a2e3e5399072f881af2baf7c7d25326d50838", 0x3b}, {&(0x7f0000001440)="eea40addd10b3762be8be06b39de5549166f8761211cd3e519667e6e43a216eaea8cf59a2c0d9c10b1ad9e11edb4924047a55a111c4171deaee586487d58f9544cabcec1507f62df3595de28eea42004300226358b700b1bf2c9997bf59590f280825164e91e4094c0d49f5c2666903262a387674f600c82798b1dd20e89e877b4c43bdb9e14cba2b70239b5277f1eb4ddfcd3841449f54ec9080f50b85e6a8cb716612f3707164b244695d1b603dbef05ee", 0xb2}, {&(0x7f0000001500)="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", 0xfd}, {&(0x7f0000000300)="1e74cc596332", 0x6}], 0x7, 0x0, 0x0, 0x2004c004}, 0x40040) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1322.290686] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:10 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c015, &(0x7f0000000100)) 03:51:10 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x80, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf6ffffff, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:11 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x1e1414ac]}], 0x10) 03:51:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104006, &(0x7f0000000100)) 03:51:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='jqfm\x00\x00\x00\x00\x00\x00\x00\x00\x00']) r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="73455b2a0bbd4cdd301e99db5fa54a87e1ea9dc0bdd3b78ac7376df86272817adea13082d30ef591e7bc9c5de493e293d274d6fdf8237d1aea8c21beaea5e8b4344fb1630ecb6222fb6b585fbcd2ccfa8344d114fbafa311ba25f194b251c8d70831e7b022c9f6870b4bb38bc08b988228aa77584dee02d9eeef0d52dc8a050f487eebc31a849ac9b78c8448c60e02f3eb5c64f00e118987ab846c1bf59de7375d6050decfc9c21608b1045c697fd193bb41f0919263499dc2dc261a7c29", 0xbe, 0xfffffffffffffffc) r1 = add_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)="7f11686d4e159b34f54587152ead46b334a0f9bf587a026f85a160f561a59e4bb52fe174c30a2a9f1289ce119296199dfd1da26ee1e770ce7b75c6da63540ef4dc25cec4fdba949774623e5f56a0f1ab", 0x50, 0xfffffffffffffff8) keyctl$unlink(0x9, r0, r1) 03:51:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x41) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f00000003c0)={0x3, 0x401, 0x0, 0x3, [], [], [], 0x80000000, 0xd83e, 0x5dc, 0x1, "689d53b8467b94bad810d267f6228126"}) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) 03:51:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x400000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10800a, &(0x7f0000000100)) 03:51:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x348, &(0x7f00000014c0)=[{&(0x7f0000001440)="99241e6cd8768326bd0ae5f4492c113737e35f22d11ee4bb494031df9e634b2df57118a1faab02327b442b47ffea01a71aef6bdadfc2b477d10e7fb62e1429893fcf9dcb57954daec34b8c757c81d51270d7fd0ceae0bae912a5cebb1b0f9baabda1c5d172d2482f2ba5c7465ad909814e620091510327167a6e62e3c76d8d", 0x7f, 0x61d}, {&(0x7f0000000280)="b495e9df85956ebbe3d072830323fde2f6731c25897bed01c84b80afa21a0dd2071c942c5f6a2bdd9ed402276de9569053770a1a4d68a098e155c3ce7e4ece3f2f57ce25a7ce667415bd0520a16e1749ca6ea8b1d2492dc23225ddc498f566b1999a95a71c490767324c2e834a99b715a9c06ffa7e", 0x75, 0x4}, {&(0x7f00000003c0)="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", 0x1000, 0x100000000}], 0x100024, &(0x7f00000001c0)=ANY=[@ANYBLOB="6a71666d833d76667376312c78"]) [ 1323.216598] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2d, 'memory'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2d, 'pids'}, {0x2d, 'io'}, {0x2f, 'rdma'}, {0x0, 'io'}, {0x2d, 'cpu'}]}, 0x31) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f00000003c0)=ANY=[@ANYBLOB="69faffffff697461626c652c003cc773c0dfc90d3c0065887a46fb4e9337975f82bb6b25211f000fcbb6598c0c4c47c807a87938c2261a9b7482692c5b31e17cf8e18d5844dee945457ad54a0fb46fe8ed5f51b91f28cc6a954330d1c519451c7c7085398d3aa1d951655d810532c43232075fad8e4ee80c45bf7682223fecc911390f0fb384005b1d6605bb1cb1e2e5c28084918565de148bfff0e6a5ddff9a4f8805"]) 03:51:12 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x1d1414ac]}], 0x10) 03:51:12 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100019, &(0x7f0000000100)) 03:51:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x800004000, 0x4) sendmsg$rds(r0, &(0x7f00000019c0)={&(0x7f0000000140)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/208, 0xd0}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/247, 0xf7}], 0x3, &(0x7f0000001780)=[@mask_fadd={0x58, 0x114, 0x8, {{0x0, 0xd67d}, &(0x7f0000000280)=0x7ff, &(0x7f00000002c0)=0xec57, 0x4, 0xd5, 0xff, 0x7fffffff, 0x41, 0x3}}, @mask_fadd={0x58, 0x114, 0x8, {{0xe9bd, 0x800}, &(0x7f0000000300)=0xfffffffffffffffe, &(0x7f00000015c0)=0x9, 0x7fffffff, 0x9, 0x8000, 0x7, 0x8, 0x8}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x70000000}, @mask_fadd={0x58, 0x114, 0x8, {{0x8, 0x2}, &(0x7f0000001600), &(0x7f0000001640)=0x2, 0x7f, 0x400, 0x0, 0x8b, 0x4, 0x401}}, @cswp={0x58, 0x114, 0x7, {{0x5, 0x42}, &(0x7f0000001680)=0xfffffffffffffffd, &(0x7f00000016c0), 0x7ff, 0x7ff, 0x86, 0xffff, 0x2, 0x9}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x4}, @fadd={0x58, 0x114, 0x6, {{}, &(0x7f0000001700)=0x3, &(0x7f0000001740)=0x4ba5fb52, 0x1, 0x9, 0x7a, 0x3ff, 0x8, 0x100000000}}, @rdma_dest={0x18, 0x114, 0x2, {0x9, 0x70000000000000}}, @rdma_dest={0x18, 0x114, 0x2, {0x9, 0x7}}], 0x218, 0x8000}, 0x40000) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:12 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2002, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0xffffffffffffffda, 0x4, {0x7, 0x1b, 0x1f4b, 0x1400, 0x2, 0x8000000000000, 0x1, 0x7}}, 0x50) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) rmdir(&(0x7f0000000080)='./file0\x00') getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000005c0)=0x4) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f00000003c0)=ANY=[@ANYBLOB="5f050000006c6521e000000000e46097cc25de6b0132a8f1983042d7e5e50c270a04f1f0f80b40aadc9519d427f2b738acf6885b71f96c48f61329604a0faf87c953ca30cc6600c47340bf791564ee6b91e221ad73648f8e394f469f"]) 03:51:12 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf8f73f00, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000740)=0xffffff0e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="d85e", 0x2, 0x8}], 0x2240000, &(0x7f00000005c0)={[{@codepage={'codepage', 0x3d, 'cp852'}}, {@type={'type', 0x3d, "14c47853"}}, {@file_umask={'file_umask', 0x3d, 0x10000}}, {@umask={'umask', 0x3d, 0xfffffffffffffff7}}, {@uid={'uid'}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@appraise_type='appraise_type=imasig'}, {@audit='audit'}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1324.151022] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:12 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c014, &(0x7f0000000100)) 03:51:12 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x208000, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000003c0)={0x0, 0x1, 0x80000001, &(0x7f0000000280)=0x7f3}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x401, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000440)={{0x6f, 0x3}, {0x3, 0xffffffff}, 0x3, 0x7, 0x4}) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB='i\b\x00itable,\x00']) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000004c0)='./file1\x00', 0x3e8, 0x2, &(0x7f0000000640)=[{&(0x7f0000000500)="e709004855543cd29fe36c4e9c51db8cda3f80eb011f90a6c5353116d1505362a53ff8ca6ea3c54e3685377fbcd2c6e404d01caa386e79c0e28aa739761ca221e7b66dcd513778e75465987f0e6e2aa99673a5b3a44ac0e09031000ae41955fd9fd47df9968d4c111a890789593866916d8b533c485f3bf04170d4d0ac095d0a496262e98e67049453688f1224159f7350f8d0608a1f41a0053f3a31270a403140d2e15792fe2693bcd30af7ea798a31e82f04a8e30a6f9ceb51db6af7f438fc0453bc0858033c64e7a3677d7b454ec086db283e47acde6b0f203771b1863fec02bb3546636fcbcaaa0f89d2fbd77412ab77d21f8f15d940097491fefc", 0xfd}, {&(0x7f0000000600)="428effde63406ff6a6d3b4c93b622ae079019001fcf078b8f645a663b3bb2f7364277f5cb8a995c9e2f72fbe64d8e7ea629ee59d341c915f8ac0", 0x3a, 0x20}], 0x2, &(0x7f0000000680)={[{@nobh='nobh'}], [{@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x3b, 0x3f, 0x3d, 0x63, 0x0, 0x34, 0x76], 0x2d, [0x66, 0x77, 0x66, 0x75], 0x2d, [0x65, 0x67, 0x76, 0x7f], 0x2d, [0x7f, 0x7f, 0x0, 0x33], 0x2d, [0x35, 0x63, 0x39, 0x36, 0x31, 0x34, 0x32, 0x66]}}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/full\x00'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 03:51:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:12 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x400000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:13 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x6c00]}], 0x10) 03:51:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104012, &(0x7f0000000100)) 03:51:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:13 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x1423c, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="9c4a7550270b993cebf1bdef29e04268ced2aff9340a70fd3ce0631a00002400000000000000"]) 03:51:13 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1325.032286] EXT4-fs: 13 callbacks suppressed [ 1325.032301] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1325.056742] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1325.072592] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:51:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:13 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x74, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10fff4, &(0x7f0000000100)) 03:51:13 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x42000, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x107, 0x8, 0x3, 0x301, 0x332, 0x0, 0x1fc, 0x4000}, "6cf70a5549679231ae103c824fa7617eb6a4f116dbe8a37e9ca507ea7a11fb5c73cc913b6ed8778156d017d6f05a5315794b123b8a3e562af32476bf84d3457a65dd7777ee74c4fbab3e3cbeae27d6b6a4c37120d01accd7de16b4e21294a23c9d98814a952c40130ba191fe8ea6ee3174a27a9b0234f23455a9f61788a1cfcb694e9c0813"}, 0xa5) creat(&(0x7f0000000040)='./file0\x00', 0x10) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1325.141301] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:51:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) link(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='./file1\x00') syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1325.309220] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, [ 1325.347975] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 1325.412920] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:51:14 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x2c01]}], 0x10) 03:51:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:14 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xdac, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:14 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c00b, &(0x7f0000000100)) 03:51:14 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x44000, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x8, 0x6, {0x57, 0x9, 0x0, {0x2, 0xb99}, {0x1, 0x9}, @cond=[{0x7f, 0x81ea, 0x0, 0x20a}, {0x5, 0x1c00, 0x8000, 0x5, 0x81, 0xa9}]}, {0x57, 0x3, 0xb9, {0x1000, 0x40}, {0x4, 0x1f}, @rumble={0x800, 0x80000001}}}) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:14 executing program 2: mkdir(&(0x7f0000000000)='./file0/../file0\x00', 0x4) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000280)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:14 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108016, &(0x7f0000000100)) 03:51:14 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) [ 1325.977975] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:14 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1326.049204] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:51:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1326.089622] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 03:51:14 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfeffffff00000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1326.312674] EXT4-fs (sda1): re-mounted. Opts: max_batch_time=0x0000000000000000, 03:51:15 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141100000000]}], 0x10) 03:51:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000140)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)={[{@abort='abort'}]}) 03:51:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:15 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x40000000000000) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffffffe, 0x2800) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) socket$inet6(0xa, 0x4, 0x4) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:15 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10801c, &(0x7f0000000100)) 03:51:15 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffff8c, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:15 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100018, &(0x7f0000000100)) [ 1326.881960] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1326.907851] EXT4-fs (sda1): Remounting filesystem read-only [ 1326.914586] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='jqmmt=vfsv1,\x00']) [ 1327.002446] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:15 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x100000001, 0x121002) fsetxattr$security_ima(r0, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000240)=@md5={0x1, "fbee56f85d738b0fd7379e64c6530e7d"}, 0x11, 0x3) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:16 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfc00]}], 0x10) 03:51:16 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:16 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10400d, &(0x7f0000000100)) 03:51:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:16 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f00000003c0)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0xfffffffffffffeb6, 0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:16 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', 0xfffffffffffffffe, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) readlink(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000140)=""/51, 0x33) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xe7, 0x103002) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000280)={0x0, 0x7ff, 0x3}) faccessat(r0, &(0x7f0000000200)='./file0\x00', 0x100, 0x1c00) 03:51:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1327.851960] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:16 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$P9_RVERSION(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="130000004a01000000006c00003950321d30309a66d165984fd69db3b4f5da4cefbec78c260f5ab6f54ffcea8e83c37961f6b7fa0912bce7822e011b25a3b1b401f595f50627389313ef4420a30ea950464f44e4b0f420f5ae5078a4497407b2eafd9a372eb473267dee5a2b1d1ae5459e3013f4d6511f7df9e554f748f0b97297cba0e12e1d28cd6a00"], 0x13) socketpair(0x7, 0x6, 0x80000001, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000140)={0x1, 0x8, "40641a684db71e2682993b690ffbca74907c31eae40d725d", {0x4, 0x7}, 0xc76}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:16 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104009, &(0x7f0000000100)) 03:51:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:16 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x2001001, &(0x7f00000004c0)=ANY=[]) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000240)=""/90, 0x5a, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r0, 0x4) lremovexattr(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.opaque\x00') r1 = geteuid() syz_mount_image$ext4(&(0x7f00000001c0)="be00000008", &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000380)="a6439019455cc4f8bb0d67be17aa32e663bddb9d35bc1576d5c9888e4081605bee7f1c6f2fe8494d332b911efa2a0d9b230cf520c46440acc4ae53a191eadd8ac746dafcfb26aba252a6eb3b8e62df5617f2e91ff27b0ed3850e71e35cd7124c96315b66fc68c1bfc9915b3eaa0b4ce8271faa899b95c69ae74726274b8d60da8280c8faa4f8388d2149b8b1f8b9909db9b427579bc0ea8bb69a783b7065609a2a6cf76fc365599530f983816897f08bea92c93506", 0xb5, 0x259}], 0x100020, &(0x7f0000000100)={[{@init_itable='init_itable'}], [{@fowner_gt={'fowner>', r1}}, {@smackfsroot={'smackfsroot', 0x3d, 'bpf\x00'}}]}) [ 1327.942885] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:16 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1328.063099] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:17 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1600, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:17 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r1, 0x3}}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f00000005c0)={0x0, 0xfb, 0xc2, 0x1, 0x7, "cc3d6e02b4a4229ae539c3b849c874fc", "aafcf563b77234a0233cc40c91fd237125d75ef134636fc563441c8ad526bb4618ef1b39f7082f8663985b84a852f50650557f609e1190515412ccb7051cc3fd257fd9e7a1cce14c7df8372214cddfeec83273eccb091c781ed415ef14c2006e77635a150cc2b71002dfc603b7000ea5b50379d4f0bcf56d07e74352ed706281af81ce979825a6175611af490e0092917276063a4335528ad90b0ef8754d1e3681723c11e3908c1408c2a3eb4e"}, 0xc2, 0x1) 03:51:17 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10401f, &(0x7f0000000100)) 03:51:17 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x171414ac]}], 0x10) 03:51:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) syz_mount_image$ext4(&(0x7f0000001480)="690121d5be", &(0x7f0000000040)='./file0\x00', 0x6, 0x0, &(0x7f0000000240), 0x100020, &(0x7f0000000140)) 03:51:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000080)={0x3, 0x9}) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) setsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000100)=0x4, 0x4) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x962e) r1 = getpid() fcntl$setown(r0, 0x8, r1) 03:51:17 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c012, &(0x7f0000000100)) [ 1328.816471] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1328.827413] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1328.897507] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1328.970764] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:17 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:17 executing program 2: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1329.187719] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1331.172177] IPVS: ftp: loaded support on port[0] = 21 [ 1332.062125] device bridge_slave_1 left promiscuous mode [ 1332.067775] bridge0: port 2(bridge_slave_1) entered disabled state [ 1332.112457] device bridge_slave_0 left promiscuous mode [ 1332.117997] bridge0: port 1(bridge_slave_0) entered disabled state [ 1335.187054] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1335.247535] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1335.317887] bond0 (unregistering): Released all slaves [ 1336.111635] bridge0: port 1(bridge_slave_0) entered blocking state [ 1336.118116] bridge0: port 1(bridge_slave_0) entered disabled state [ 1336.126314] device bridge_slave_0 entered promiscuous mode [ 1336.173821] bridge0: port 2(bridge_slave_1) entered blocking state [ 1336.180328] bridge0: port 2(bridge_slave_1) entered disabled state [ 1336.192572] device bridge_slave_1 entered promiscuous mode [ 1336.299331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1336.379694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1336.591349] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1336.671790] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1336.759417] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1336.782019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1337.095769] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1337.103678] team0: Port device team_slave_0 added [ 1337.148143] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1337.155665] team0: Port device team_slave_1 added [ 1337.199875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1337.248238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1337.296512] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1337.303755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1337.321254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1337.399665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1337.422324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1337.432357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1337.970240] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.976689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1337.983810] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.990185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1337.997788] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1338.481703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1339.777159] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1339.945310] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1340.112243] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1340.118437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1340.134803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1340.291007] 8021q: adding VLAN 0 to HW filter on device team0 03:51:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104002, &(0x7f0000000100)) 03:51:29 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4000, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '&/selinuxem1:[eth0'}, {0x20, 'bpf\x00'}, {0x20, 'init_itable'}, {0x20, "690121d5be"}], 0xa, "81ed"}, 0x37) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xa0008000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) timer_create(0x3, &(0x7f0000000140)={0x0, 0x17, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_gettime(r0, &(0x7f0000000240)) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="7631441718246d080a13e77f0f2d"]) 03:51:29 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x201414ac]}], 0x10) 03:51:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1341.353162] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1341.372415] EXT4-fs: 8 callbacks suppressed [ 1341.372431] EXT4-fs (sda1): Unrecognized mount option "v1D$m [ 1341.372431] ç-" or missing value 03:51:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108002, &(0x7f0000000100)) 03:51:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400002, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0x7, 0x4) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1341.496490] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1341.510740] EXT4-fs (sda1): Remounting filesystem read-only 03:51:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:30 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) set_thread_area(&(0x7f0000000280)={0x6, 0xffffffffffffffff, 0x1000, 0x313, 0x9, 0xff, 0x2, 0x3, 0x2, 0x5}) lsetxattr(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.nlink\x00', &(0x7f00000001c0)="69fc20d5b7", 0x5, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:30 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8000a0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10800b, &(0x7f0000000100)) 03:51:30 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:ldconfig_cache_t:s0\x00', 0x26, 0x0) [ 1341.683153] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1341.690749] EXT4-fs (sda1): Remounting filesystem read-only 03:51:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1341.792319] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1341.838011] EXT4-fs (sda1): Remounting filesystem read-only 03:51:30 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x74000000]}], 0x10) 03:51:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:30 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x5, 0x80000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'ifb0\x00', 0x0}) bind(r0, &(0x7f00000003c0)=@xdp={0x2c, 0x6, r1, 0x32}, 0x80) mkdir(&(0x7f0000000140)='./file0\x00', 0x11) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108018, &(0x7f0000000100)) 03:51:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:30 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xac0d, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1342.227713] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1342.237727] EXT4-fs (sda1): Remounting filesystem read-only [ 1342.245964] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104010, &(0x7f0000000100)) 03:51:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) umount2(&(0x7f00000000c0)='./file0\x00', 0x8) [ 1342.314213] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1342.330055] EXT4-fs (sda1): Remounting filesystem read-only 03:51:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000001c0)='/usr/sbin/ntpd\x00', 0xf, 0x2) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x19, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00']) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x200000) 03:51:31 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4000000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10001a, &(0x7f0000000100)) [ 1342.552098] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1342.579156] EXT4-fs (sda1): Remounting filesystem read-only 03:51:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40, 0x0) ioctl$TIOCEXCL(r0, 0x540c) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e22, 0x101, @ipv4, 0x2}}, 0x1, 0x88, 0x8, "1b3b74e50724d3a44525aabe4c6a77c5c59d79a5f9a87850ac2963df294084884b88cf3e11ff35a807e1d80d4cae0207a06421c3a3d827114c4353be7a8726b0a90da05178367be19f580501b0198e81"}, 0xd8) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1342.694706] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1342.719999] EXT4-fs (sda1): Remounting filesystem read-only [ 1342.833018] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1342.845169] EXT4-fs (sda1): Remounting filesystem read-only 03:51:31 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xd1414ac]}], 0x10) [ 1343.093535] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1344.506071] IPVS: ftp: loaded support on port[0] = 21 [ 1345.552268] device bridge_slave_1 left promiscuous mode [ 1345.557808] bridge0: port 2(bridge_slave_1) entered disabled state [ 1345.592442] device bridge_slave_0 left promiscuous mode [ 1345.597955] bridge0: port 1(bridge_slave_0) entered disabled state [ 1349.420980] team0 (unregistering): Port device team_slave_1 removed [ 1349.434783] team0 (unregistering): Port device team_slave_0 removed [ 1349.447824] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1349.548673] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1349.641233] bond0 (unregistering): Released all slaves [ 1350.189804] bridge0: port 1(bridge_slave_0) entered blocking state [ 1350.212408] bridge0: port 1(bridge_slave_0) entered disabled state [ 1350.219787] device bridge_slave_0 entered promiscuous mode [ 1350.339498] bridge0: port 2(bridge_slave_1) entered blocking state [ 1350.361566] bridge0: port 2(bridge_slave_1) entered disabled state [ 1350.368952] device bridge_slave_1 entered promiscuous mode [ 1350.479150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1350.621679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1350.862310] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1350.981973] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1351.079333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1351.101554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1351.149130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1351.156124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1351.294419] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1351.302586] team0: Port device team_slave_0 added [ 1351.347022] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1351.354591] team0: Port device team_slave_1 added [ 1351.400551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1351.449724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1351.512615] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1351.519776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1351.549217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1351.617852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1351.625171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1351.642689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1352.196697] bridge0: port 2(bridge_slave_1) entered blocking state [ 1352.203140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1352.209810] bridge0: port 1(bridge_slave_0) entered blocking state [ 1352.216231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1352.224671] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1352.801617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1353.967388] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1354.131060] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1354.296324] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1354.302644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1354.319020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1354.475551] 8021q: adding VLAN 0 to HW filter on device team0 03:51:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10401d, &(0x7f0000000100)) 03:51:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, &(0x7f0000001780)=[{&(0x7f00000003c0)="9392c3650d05596ab1e9dfe528032a2e323ef4cf0bb5916b560f1f68fc2bc77505e3f10e5bdbc643a51138ef807486f190cf4c7598b6b147a0124d332a8cc783ca358f622fd5bce20ff071e9feafbf7b73f0fe91e7a4ee73e23a62da53a8e7bd32f42fd9f29b3908aa41a25ebf7cfe6854cc3e3e8328bbeec383ade5b917859da6375c0882b0fcb0884d4a3ac54597b83b83a3ce3c1fc0e48e1f2ced4310b2eb7d26250e92e22e2b232149481a1d6a1e23a6b03af298a3142d5678ba75ce615719ddc787141fd0bd2ad117f7de0dd48b08404ea7cff927a6ac80247d028f66e7daaed40fbb407b15a8b399a2ae3e9ae16977f61e90f103", 0xf7, 0x9}, {&(0x7f0000000280)="2a08be393089db404fea7d7c943e34b208b172b8d11ff41013ac0e9d5717bf091679a375bd2ff9117323f911f17a118debb3ddd51b26317ec96dff439f416d2d8c4afc2d7f7459217d670edf480444b80d5fedac22cc5bf09323f6b7aa736087c0638a0a37fbd98b8601119c8b91ac64f7577ba02ccfdc29b04c1d289c3e86bfd86a45", 0x83, 0xffffffffffffff00}, {&(0x7f00000004c0)="4a9104eab2fd82039868e1179a2d6bfaa47be01a76267b1636eff8fbde836c4d56fa19a1da3a0b9bc90f7778a1ee931893d495a72c40e90b04e1f04764c1a4982ce6fd69d6fb115e98bcc1f11df9c0e25815c2599a3968758624619ad66f1814b36156746766d1e9a58e9d559ccc5f5a4006911e0b40199083b2acaa0cfac06da046f5ba764331448db7ad1d5f0439274c6c0707643f", 0x96, 0x5}, {&(0x7f0000000580)="dddf7ab7ef4d6a78d8606d03709da1b0292cb2a1c3123f2f715f9243dbe9cd19f7dcdb094709e3ba689e896f5b1551e2b87df37b619bafa1f2b11130d1b45a450cd59dd2768ab6f2a27eda42b06bf6dc10310588bd74dafd3b6caf87aaa26c565e56171cb20db16939927b9966848892bacde4c1d75887b5e78ce5336d24c4268a9f55f8543a5c8e66240cfedbdd6bdd19e647a1ffe1d6d3cf69e58d65488022e290f2d70fd2fdfbf97e288f2c9cdf0be76f8a52446c9a100d5819e048b8717a6a44faa89dad7b941ddd37b1a6e44629f69b0557c31442f28e8cdf7b87bcc978be16a8745e70b041b2f053821b55c0d762727be26ea74cd3540ab858ad876a47311c31055a40920fa58dea1097c52ae77d025c7d4756354526ac702943ecb34963c3cf60e05ef3a8a6677d2335df890a923bfc8b8c7111a2f3992865b0ab00ce5f4dbc282d6a4c2159c3d00640e46168e264ed5cdb8d04596860add354238ef0ed02ab1615a927b7d25693e00674106c99fd9785493f58ad96b906d5bbe3ec967103d12879e4b875620a5941240148bade3412b580149ee6989e1fe58961df7c7aa477f406f6395274fc38c1b615959d4b7fce7997e83d4201fa2efbcf1e445fbb7dba1b562f1e979211f081c25f529ee665e87589b824a110341326a9a1c2c99544f2007064ef7cfd2955eff3ff5db70bd6aa7c0a059df02bbdf4347363b9827cfb9f61e0d77e48e5b2a3751a9ea56408137546c8b3dbcc781a140e71319c9a0091b5bed4bcbd9b171051ffc798887fa9be03d6f2fe6933c136ea30d0dfec83caffdb438046e855d43826df12cd0a04088699292f35ce8c6499616f8a7ce13e485c1bddaa4605dcbad5631d70f5d3b81d9fa36f2854d8991665996fcad48d07487406de8e2df9c04c1f2862ea0cc6a514657e33c42985aa26733b2af57e4654907b07893f3706416472e1cf51803defae802c3568e0f474be2484e364236cf3f4629b8186485176d47c93948058b0ff2c9f3f9174dee4062478455ea58686dc3d3b5e3cb0e5468bc51c33ee04157fdbb0dde5f1e24738bee6e3b6ba3873224047feaeba4f0801966e544c21d1526ea1f2064ee3ce7be78ba1fe93eb2d8b1910a802bc13f44348f9a9afccbaf2b85b933605e978d316ae4b27f78cd9bb9011479651336246a2401b2415b9068590b74ff646e24aeacd1a3c608c91d4677d153c21398cf469c24474194ea9f835b5635f41a5da6333df8c2c892bfea709233f377cecff83cd1cfc7e019389cf4e54de1f4345ff934f9fcfed5a7484d80deadb26f2d08eab9d114ade6ef77a7b0f57e729b87dd7e31644906ea1124635f3e0702bf1599641de9097c7ca52048a58759005f18be7e5c1dff6e72fdb514e786cef2202fec8b8762d5346117db9695fed40651150f0df514fccdf29e502bd4fe392fa8028d1ece71b99acbb1fa46dd0ce116dbf167746a28c4b02919d4f1c3f16b22a1fac22a413ec127a9d917f564b802aff75917845cb18e4582ebdd6755cb582f1d728055addc293ac757de77fd919471c1d41cd3d67e4926bd9194a2d693f13344a96a8c3226916ffef0302ab720ce11d50968054a7458fbd8e2e5d1b2ad24f64f1f663ae1ff17aa33cdb2ac64092a3e8f580c2f2823750beb5ecc359ae3bd8a91f1f8880da37f5a325805497a518efe3ad8cf9bde16c9daf77cf6604f7f1962f85d45a822a1b204b440430b62ac7998dca95c9bf96b729ae2c64c1cf5fe57cd87af86a7512ba9f4207583e3c5b3f11038780328de1fbd87aba4ca8afe7a542d0e019d93016589031510bb5533d8dd3407aad5d39ccdc9058d03f0309913cc206d05b98fe8ef303207f2431d074f016dfc95e3e9682f8f337f3e2ef25dcd25d683ad4ce292b11a3aa7461acda8bdc9132cebd19e8a11581798f2b3720f3fb598e1bccfb1c46687b01c0253a1c7fd8e0063b997a763e0af4b7fd83ef30368b1c89200ca97498ef3f386d5ae94fd385658669da6f36c4ce3ca29bc8b4e65651d93a3929e20994c25375d46ff249ea668aceef026a734ef5745530b654bc14ba54101d3a80638025e0b7fd21c89bba5b50d7d460388d61b647aa7743ac3ada6afe157aca1996dc93362a41b63410233d05c01e7a8bba15e2a7f9b78b314c27366504d4152cd09e2cda467134c8b706cecefb4eb8fcef74a7c631439740a934aeb8c59a11ef3cca64a35baad5c95b7e2141b392b74059dd85db33fcd173aa3d631318dd9216b4c4d63f04b5ac4b4f131d376fb82bb41f78f7f1cd90771ffcbd1dd6115a9faa01033bc13c98349908ee056919a492129da9916b0c9e0f427a33320200b35d3d8d63518591497dd93ab0608b921b9951748c7d486df643d0450555773dae6f344cf9577ab21f82488eff9d6ef77b076749ed272e2c8e1f9c5c89fe9ad56597c58cdc65f563583361c7c8f5d8a5a79d8f27a90fe36fe65b3cf36d0abf42cd380e577fdb5a8485a209edcd7e52f4953dbc9bce2c52eb17050fe24bfbe625dfa7fb66f10a86cd7a0c22d765171a1390ced30d3d3cdb5215d839c0a99cfe54d0a83a260b95f30b36744e6b70cd3c835a63d085f3f312d0c06ca42840fbfabcacfc2d52137dc8e28b3a0ecfe94f679b99101ff8b09c50f9515d5c32f555ed1788915bca77082842d846ca5d89905d51bfb7d977dd9494927b9b3e2a44b10c39743d91a191acb1ea31d0e0b66b4a11cc5ef2f4c0855688787438a2b50d0ec8c567e9c27c863028bccfa21d5b22968845fbc757d6617ad10add57a23c8a592c89c47623adb26829ef52c93c1c356a04d56edf0e0496d11cf2e647639853e57ff8b150112717e84850cacfaa1078d390291d3c6fd325bc7ef54c3a895f3ea7b98c1d7746515e21a2265b0a4ffa48d5cad628491a495b6660b783cfc83791ba28374d113154331ef3d973de74f31bfa74d3b508369bdd53406b4ee2af29d56ee2b74d73faad18291e5486f47cc86646bb183637b64335bb777f6ebc8735054f533bb1c6e0be248be2c12e19156201c4513bd08480d0723e3a6cda19effe0b4156f862aef4a3db81f03f6845f6bd4c86659ef1b4966e266ddfadbca57a1d1a7e62ef5f75a6b896c55b3d24bf88b5d2447d80f11b083b7477feb833ee9edb78f8a8e2e5a5c95b1223b6693f775f9141f373d11cd614cc3f1d75c8ff9443704e376ab732ac6d71551b636670bf8214f8de779a9102c59ea45f553f939a14b066f0103e995289682ba06e9e7894c988fdad9e349385c134788d4e3046f766d8f8e2aa2f6eedd6f7ae50c9b8eae597912c6a5fcfd4dc39db63168dda34b0d1e1fddb3c420bc35fb57737d7c50d58cf7ca8286378f40a0fc8da6a15355996d7c7c44d6b9bbf319ea84ebc89f18c9193ec4d1f62e40985d31dfa00ddf89968d9beff001821e40aab8c66664a70e029845fcc48c4b05b3333e897ed51b0ab0d6e37b84642119a1e07aaecee506be8ca74646c821afcff7e6d5754e6beac9b81f27d0bc05c06124de680439cbad7fefe4b286cd64a679abf1ca7f0a6b631057da1a4434d2de70ead78a679f008a698df4bafba5f04c8a9266cf2c7de93d79f13758f22c1a4df83537f4ccfcc1c25e1b1f63746ee350c06f128eae2fcab4bf51bd153e2293763abb732739da17ca1f982139b42fcb8190f7cf26cc9cb43b0004e7dea76ac621020e50350c3ac6757a9dfc04ab58e05597e7a968571f52d240096b70e2361b481f03b5b6eea7c91703fa890209d8e2393e5da7bf90eae730cc154c825a67557aff53bd9073beed951d60d5bf5b974d3cd2a1aa588e0a6d198538f525aceafff122455e04c11b642d8a528d5d47d745f784951613d65636ebf286f007ab3bfbecbc2e03c92e236a8edc5b1e3f3415dfc2c8b931d58bf7e0995f0edfd5769c2ceac158e63f828e0e51e76fc3aee2aa8ec1e9ca41c9f14599ec44b13fc662e1c4e633e50df02b7231bb89727c848d3a04295fa8c8ff3c4cd855013808d6e30efd01bb2cf4c3b0d9866eac255ad124755fa5339c0847191126a7b353df262d3acb4eac57ced47882c31b370836275c9ee46f313e684a8b019ebfbf2be8f263ac6cc9eac08e2c226df93a5b9c91fb4bbc2954806b26fd4fc38add868a680880347be9281bbd22a4ad8675ef158e5f58f05442b8b2e173d1ec9c80e01a7ef59d1f5b6de9189d01dc0b76bdef1230cfa823127f41d341ebab727ec9b6e7cef9922e8101faae7f9b0f9ef55fb50bc5b4d9a15a4c75096fd3792c02e42559f6fe3f35a7ee036361f83be09eeeabe744dc9a02e7329e04977fae67990912be433f3346cba863da44e098e64c4868fbf7769e848194ee2aca833e976cfb73989a4d40830a654e3e00cd3907fa4844f5fa8f9457a566bdacf763ce1c3ca6b6764f9f060743d0801b267fd6299b8025b81ecacc1d8755e11316fb5251c04d1c6e51285376dcdca4792335375cd3ecdace8f5d6156fd2d38fd5f2c5bed12b89c18a1c02def22541ff39250d7679d9a65a7b42c385bb61cd0e73279bf58d8868ad6f435ca1f21665118e7fdaea852171edc2f1a5e8d64f3459280f4213eddc6c75a9322f5c36b3182f79a2083749982c44fe9c8d28457cf5fa25e1075e6dfb164f19e202c3f1c499032a9d39256c11044fb1942857c728a8fbdcbfff2990a2427a11ce1b79a041977fc09588b1285135b901b9b06894e503d79ee1b46cfc23edf68f392b29a613db2e1f3f8b6a916495681d7de531045c31e70039cb51991494724db712bb13276cfa3dc79f1dc7e24167a25224994c92daad1e517b57015e031657e71ac9103bb4aef03426d841d59bf88f2de6267a03c756d686f721fb1e514d395725c5e68a85a3dc10005d24bbeedf6e9d6458d8465f0283abb71fe0f40fe44ddd167039a52649fcbbb0c82741f8eb10e50c4ae8e5294b953730f3d58014307de92b6bb475fb3d3cea3522a7939636955eeef2f27fb9ca9f4d9f40e42100d2c5879fd5e6d8fdb0cc4f2bdfc5cbed6f350e7208071c4fc81a68bb03ee7a12ac3f0b661e0da6b932cbf97fb7956f9366860c514da0945ecc9d7b4db09dc4c0b2a99adb9978b48febd14fdba3c1f874a952ddd440cd6e64712c56d14b99d3b934d801713fb0e593680784f8d43f83d309bf1658402e3d07b57138ad18ad580d269b96879153d3d07ffb27dfe01b88edc38dc1d062e25f1d6057241d9da8f80e249c643516cdcee6a863a91677c57f6db1f6329c9f1c5164541a19f2c428902353d95efed896e1481169810d50d8e35090d0fa9feee597b758b8b1e0ccccf808ddfe961c7a17b22dbb7ee9acfd31a22dfd2553fe9b3e8805d02f01a8074d30552053973ce017337ef3f0acc4181a8a7c7c15880c5b36b3e671d86745b8682e785cb291b0641e6d2dde48f55241246068d59de4f33c6e42ffe1420e0d6d9402e53c98b6688800b9c3d76fa5b29649c908bf4f36c321156eaeb4ccd8ad489fd8488d8c54a0c50466728f0f657c3e5c9d236bc90159386859e06f2707ae887682fde5d8db8ff881c6bcc84bfae9d66ae3110fdf4bfe1c7657ab6f60b094dc03097e7dfdb9ea7776be8d3c9fe28eae023d612ca282963a73ffb6e7e22ffaaf8c5af2ba6908eeb0c6884ca21bb936b9a669f7c6a5fdf74b6b708e6662e4d80eaedbf9a878ebc4b0299946a88cdf8a21a167f1980be4bc967ddf090442760aa71c83f066544b19e425c32be2e0305fcdc33c0fc3beb7f015277635029ea7cca50d296fca5a2bf845015cfd", 0x1000, 0x101}, {&(0x7f0000001580)="42bfdc984a47b9c31578e827c13890e5bec850a8b2697f3bcc7830b4012a387a9a86a85a07ba8463250ee696b74a9cce46ef0ba9f9131e7a03f8b873148d487d9cfe5da8e1542f8df7cb686ab96f4962762f1f66de218bac69a7bf44f70ae884f12928308ce092594498ab879a2b96baa9bbe577d005427cbe3c5356d478b3d15bd1f9b7e6db30b9", 0x88, 0x6}, {&(0x7f0000001640)="392e13c2461f0668be6cda043a335f63b2d1c1491dedce3dbddbc9d2e411b48f925c2d8e4b1e3bef8a8e42c5f4969c9f8769494ea70f47fa9dcca97d321ab08c8efc41fb8a6564886cad58edcf278935e699f1ea35368a1845fbd3f4875de68fe922bc8f86f66f879f84abf8a4885dba3f", 0x71, 0x6}, {&(0x7f00000016c0)="b6940c55fc65023e171e5e39f34a770338acc2761acaee35b639bd638f30b73aaf3d757f7ee4564a8b12d667bf8e85ad7410e926002134c7b257534a415de084f7e148b120a18deafb0f4c637b160f337782490c8dcb2144e7476a6b8da9dd03ceba76145346dc46803a5ab128ea50b701fff62ef450a3eae5f06cddfae57eba0f556b84f22e1c053f26fc96fe1e586a3f1f10b089c5a5273a3a874b2a9fff768fc61a637bbd30453c8d61b9cbe4aa9688b8c4a0", 0xb4, 0xfffffffffffff000}], 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1a0ffffffff, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:44 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = getgid() fstat(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000100)=[r0, r1]) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000140)='ns\x00') 03:51:44 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14140d00000000]}], 0x10) [ 1355.504605] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1355.517012] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1355.536745] EXT4-fs (sda1): Remounting filesystem read-only 03:51:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104007, &(0x7f0000000100)) 03:51:44 executing program 2: setxattr$trusted_overlay_nlink(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'U-', 0x20}, 0x28, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) mount(&(0x7f0000000100)=@filename='./file1\x00', &(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='exofs\x00', 0x8000, &(0x7f0000000280)='security.selinux\x00') 03:51:44 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2000fff, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1355.652712] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1355.672314] EXT4-fs (sda1): Remounting filesystem read-only 03:51:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10801a, &(0x7f0000000100)) [ 1355.778379] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1355.799711] EXT4-fs (sda1): Remounting filesystem read-only 03:51:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1355.893736] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1355.913536] EXT4-fs (sda1): Remounting filesystem read-only 03:51:44 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getpeername(r0, &(0x7f0000000040)=@hci, &(0x7f0000000100)=0x80) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="ff00000000000000626c652c00"]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x10000, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000240)={0x400, 0x80, 0x5ab, 0x7fffffff, 0x3f, 0x10001, 0x4, 0x7f, 0x800, 0x2e1b, 0xffffffff, 0x80}) 03:51:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000001400)="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", 0xffffffffffffff4b, 0x2}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f00000001c0)="cc918abbadb9cccfe8df2ef8afedb31da163ccf7306e35837df1c257e687e903", 0x2f6, 0x100000001}], 0x100020, &(0x7f00000013c0)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1356.019416] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1356.036206] EXT4-fs (sda1): Remounting filesystem read-only 03:51:44 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x20000000]}], 0x10) 03:51:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100025, &(0x7f0000000100)) 03:51:44 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='security.selinux\x00', &(0x7f0000000740)="7379495b0da4374448687389595c5af40374e647ca9f6567da33dfd7656d74753a6f626a6563745f723a6e61746c6162656c3816a2a0dadadc88badeae36adef1c3814e2d3f8db59894c11168d5a136d0a6d15d162b61f02f44e67adc61f8fa219d4750e39db02be", 0x68, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000240)=0xc) r1 = geteuid() getresgid(&(0x7f0000000280), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) r5 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x5}, [{0x2, 0x2, r0}, {0x2, 0x1, r1}], {}, [{0x8, 0x2, r2}, {0x8, 0x3, r3}, {0x8, 0x4, r4}, {0x8, 0x3, r5}, {0x8, 0x4, r6}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8000, 0x1) 03:51:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x5000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1356.296955] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1356.313952] EXT4-fs (sda1): Remounting filesystem read-only 03:51:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1356.401123] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:45 executing program 0: mkdir(&(0x7f00000004c0)='./file1\x00', 0x1) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000180)={@local, @remote, 0x0}, &(0x7f0000000240)=0xc) bind$xdp(r0, &(0x7f0000000500)={0x2c, 0x4, r1, 0x30}, 0x10) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)=""/210, 0xd2) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="696e81745f697461626c652c00"]) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/current\x00', 0x2, 0x0) 03:51:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108011, &(0x7f0000000100)) 03:51:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1356.506849] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1356.527283] EXT4-fs (sda1): Remounting filesystem read-only 03:51:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:45 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc000000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:ipmi_device_t:s0\x00', 0x364, 0x3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x12000, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000280)=""/112) [ 1356.793555] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1356.801145] EXT4-fs (sda1): Remounting filesystem read-only 03:51:45 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x7a000000]}], 0x10) 03:51:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10001e, &(0x7f0000000100)) 03:51:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:45 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffc) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:45 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7a000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="6a714e037df26675907e93661573765f1cb3312c00a5535833e1d663cc8a31cdcc63e2be63093b0e1df7ff097c4f594153"]) r0 = syz_open_dev$audion(&(0x7f0000000640)='/dev/audio#\x00', 0x40, 0x2) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000680)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000240)=""/210, 0xd2}, {&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f00000003c0)=""/183, 0xb7}], 0x3, &(0x7f00000004c0)=""/7, 0x7, 0x82}, 0x1}], 0x1, 0x0, &(0x7f0000000540)={0x0, 0x989680}) setxattr$security_selinux(&(0x7f0000000580)='./file0/../file0\x00', &(0x7f00000005c0)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x1) 03:51:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1357.257780] EXT4-fs (sda1): Unrecognized mount option "jqN}òfu~“fsv_³1" or missing value [ 1357.289117] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10000d, &(0x7f0000000100)) [ 1357.349036] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:46 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000100)=[{&(0x7f00000003c0)="91f0559bdc12245347dcd11cb924fdf84eff1dd70c9ea1ae6b2c1f8188c5a9802cdb13f59d48a42b6cfc6ac6149b9430bba382c71a37645585e23acb360f2e89cfe375856051c93d6a9884eea17db1964cb748497cc309860cb07eeb6bde42bb85c006cfbb8f8c128da7f2590e2febf011802dbcd1ceb531762d3d3173f8b0b84f1ce034262f8628e9cb5901dc073822e42fad7e72ec2217e37800dd8062d07aad62026f7581e542efe84cca018e77467fb6f0ea6b5dba7e9dc96867fdf9223755c1dd224d58e99629bd5ad37cd7326f3ae973e52bfd611694d29700e5e25c6e7aafe235237187f6c231211de7", 0xed, 0x101}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='dots,obj_typepcr=00000000000000000009,\x00']) r0 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x11, 0x80) write$FUSE_STATFS(r0, &(0x7f0000000700)={0x60, 0x0, 0x7, {{0x5749, 0x5a108573, 0x6, 0x10000000, 0x0, 0x7fffffff, 0x4, 0x50bda9a5}}}, 0x60) 03:51:46 executing program 2: lsetxattr$security_selinux(&(0x7f0000000900)='./file0/../file0\x00', &(0x7f0000000940)='security.selinux\x00', &(0x7f0000000980)='system_u:object_r:initrc_exec_t:s0\x00', 0x23, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) prctl$setendian(0x14, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000007c0)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000800)={0x0, 0x4}, &(0x7f0000000840)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000880)=r1, 0x4) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00UT\x00\x00\x00\x00\x00\x00\x00']) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg(r2, &(0x7f0000000300)={&(0x7f0000000100)=@in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x9}, 0x80, &(0x7f0000000640)=[{&(0x7f00000001c0)="26dbeea7645cb6a7b2bb932599584c46687558cbafe577c339cf38c5d18612ef99bb571c039668071a16f7e42252e846", 0x30}, {&(0x7f0000000280)="8a535e5a5e743a7712d870080bf39d9ac4de1b5652f1277a800951f97f7a195b67544568d59536a3bcc4ef642440d9d943f54c61c2f0258e9ce9a8c7b901f4492fa1848541166d9a7a8cccffa2aef2e3ae7f922511f54b91f000b6b0424d8b520a14c550580d173d4eed0e361ffb9c6f1de1b8ac0e9c5406e3d632", 0x7b}, {&(0x7f00000003c0)="4199a14e723c4541fb8b20c7de4329ba8727f0da6cd3bf656ee5036195a3e0b250031bad77bd6817ca7782f7957c0bd4515ab93129166e74ab6df68ce3525f6c536c8d107eda9538a938d7c23fe7cb5b7f93345b7c231a0242e80617520ea0a79232012ddcfce740daa397329d29b9471d736fb5d3fd16aee8d3f911323d8d26a3a9bf5506788c59c1f4719c939020360e5b523f35da646280edebb42a67ec4aad4ed9d821011ab5a88b", 0xaa}, {&(0x7f0000000480)="f718f1bedf3c064e14318825037f4ef74154fae3f6cd2266a5534e02e83b0488b4af28f8f5a2282270825c97175dbc6fc607d2edbdbc0de08bb96038e2f00db4740ecba19ea00e91b8a1e81d9ee3a25f4118f55f69fa4eaf850ff15bb710", 0x5e}, {&(0x7f0000000500)="2eacb3bde9fa90c60102499b47368046c1862587de9f8da226b09c4a70f193e585c5c8ebd97326d2b93ae3e67a83e14ce54b49591ad56c48f7d31417633e29acda1f34090716739166e57cd8c9c93b", 0x4f}, {&(0x7f0000000580)="9079bb167ec8993e17039498afd151f64ae556fc92adc593f0eb53070b97b0c40bddf1c648cd8a06ac2c4f085a861e32808fa4e6e32c79f8b398cdc46aab0ed95d71b549c0a8e11f15466b2e3e5a8ec73954b3358fc9b3d549cd24a89ba4608e498a8e227e124d01c1ead40661e6db0f52fff9648b6ebf6945e70a8eeccf2c29a48349008280e4bdd4aaefcec57abaa56db29bd763327ce1dbb8eb420734ef272608f2e676664ed88cd963d2078382f1cfa35f46af7275357ff7", 0xba}], 0x6, &(0x7f00000006c0)=[{0xe8, 0x0, 0x8, "dc6e9dc328143522f5b369d30670c59e9772418d4b27a2d5321017d3ff9fc37edfd07832d388b9014882bb663ad3817ae54cdaf7ee9675d5561bb9d6577a53b8d362709ca0a80d657432e2805327e93e2d07241a64293c8f84a1fa6593ceb9fac48f0b73e2e884166b021fc40e1addb7413674a3b8335abaf3719e0e9f22c0796522308a5a0cac36078d6c92cd326cdaab23081b5ebe3ddf0221f93a82903176098d78e000c2d254eb7d01b83f622094c036d4bbfb0743ee0d7eb9115400dd17c8815eb7849d1e0d053b84f7c27fdbe7e3"}], 0xe8, 0x855}, 0x1) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000008c0)=0x55c) 03:51:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1357.389960] EXT4-fs (sda1): Remounting filesystem read-only 03:51:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1357.537464] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1357.648555] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:46 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141c]}], 0x10) 03:51:46 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x500, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100015, &(0x7f0000000100)) 03:51:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:46 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="affbdc369a3329697461626c652c00"]) 03:51:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) mount$bpf(0x0, &(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='bpf\x00', 0x200000, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x22c8}}, {@mode={'mode'}}], [{@context={'context', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_appraise='dont_appraise'}]}) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c00c, &(0x7f0000000100)) [ 1358.171048] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1358.182491] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:46 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x9, 0x4) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) 03:51:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x40, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) mount$9p_fd(0x0, &(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='9p\x00', 0x2000000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0xa3}}, {@nodevmap='nodevmap'}], [{@context={'context', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@uid_gt={'uid>', r2}}, {@hash='hash'}, {@fsname={'fsname', 0x3d, 'security.selinux\x00'}}, {@dont_measure='dont_measure'}]}}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:46 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf83f0000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1358.459594] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1358.460676] 9pnet: Insufficient options for proto=fd [ 1358.486298] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1358.536879] 9pnet: Insufficient options for proto=fd 03:51:47 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x2000000]}], 0x10) 03:51:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100004, &(0x7f0000000100)) 03:51:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:47 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB='mnit_itable,\x00']) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x40000) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x0, &(0x7f0000000080), 0x5, r1, 0x2}) 03:51:47 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB="406e3895868d5348aab05d00ff"]) 03:51:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1359.060993] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) utimes(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)={{0x77359400}, {0x0, 0x2710}}) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10400a, &(0x7f0000000100)) 03:51:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1359.121225] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:47 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="5e6e69785f69d62e74"]) 03:51:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1359.235117] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1359.394503] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:48 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xac0d000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c01c, &(0x7f0000000100)) 03:51:48 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac1414aa]}], 0x10) 03:51:48 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRES32, @ANYRES64, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES16, @ANYRESHEX=0x0, @ANYRES64=0x0, @ANYRESHEX=0x0], @ANYRES32, @ANYRESDEC, @ANYRESOCT, @ANYRES64, @ANYRES16, @ANYBLOB="83bba306646f96a667ba7ef69e2718ab118f2fcae2508837492a96557474bc202c01e9d43e3997c450082a8ea2a07d2a104ffb7d87d25649684d9bbe501d8056be18107bfb3978308b0d40657194309a818a6db8c8011a85755d3595f273cd39cbd8d8651104eb6672637c3b0b8ee183b9e351d0e9473a52d2a7908e8a2440ceb147ef24b2b33521f47f5a73b52fa95ea8b607ff8eb76563552a752c14186ea794"]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) 03:51:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) clock_gettime(0x0, &(0x7f0000005d80)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40)=[{{&(0x7f0000000100)=@ll, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/158, 0x9e}], 0x1, &(0x7f00000003c0)=""/61, 0x3d, 0xf0}, 0x2}, {{&(0x7f0000000400)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, &(0x7f0000000580)=""/55, 0x37, 0x7f}, 0x10001}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000005c0)=""/84, 0x54}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000680)=""/97, 0x61}, {&(0x7f0000000700)=""/87, 0x57}, {&(0x7f0000000780)=""/174, 0xae}, {&(0x7f0000000840)=""/209, 0xd1}, {&(0x7f0000000940)=""/141, 0x8d}, {&(0x7f0000000a00)=""/56, 0x38}, {&(0x7f0000000a40)=""/173, 0xad}], 0x9, &(0x7f0000000bc0)=""/176, 0xb0, 0xfff}}, {{&(0x7f0000000c80)=@sco, 0x80, &(0x7f0000001f00)=[{&(0x7f0000000d00)=""/54, 0x36}, {&(0x7f0000000d40)=""/254, 0xfe}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/137, 0x89}], 0x4, &(0x7f0000001f40)=""/162, 0xa2, 0x100000001}, 0x200}, {{&(0x7f0000002000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/30, 0x1e}, {0xfffffffffffffffd}], 0x2, 0x0, 0x0, 0x5}, 0x4}, {{&(0x7f0000002100)=@nl=@proc, 0x80, &(0x7f0000003380)=[{&(0x7f0000002180)=""/224, 0xe0}, {&(0x7f0000002280)=""/27, 0x1b}, {&(0x7f00000022c0)=""/16, 0x10}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/127, 0x7f}], 0x5, &(0x7f0000003400)=""/120, 0x78, 0x6}, 0x3}, {{&(0x7f0000003480)=@generic, 0x80, &(0x7f0000005580)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004500)=""/124, 0x7c}, {&(0x7f0000004580)=""/4096, 0x1000}], 0x3, &(0x7f00000055c0)=""/172, 0xac, 0x3e766172}, 0x7}, {{0x0, 0x0, &(0x7f0000005740)=[{&(0x7f0000005680)=""/20, 0x14}, {&(0x7f00000056c0)=""/107, 0x6b}], 0x2, 0x0, 0x0, 0x4}, 0x4}, {{&(0x7f0000005780)=@hci, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005800)=""/229, 0xe5}, {&(0x7f0000005900)=""/245, 0xf5}, {&(0x7f0000005a00)=""/68, 0x44}], 0x3, &(0x7f0000005ac0)=""/115, 0x73, 0x1000}, 0x1}], 0x9, 0x0, &(0x7f0000005dc0)={r0, r1+10000000}) getsockopt$inet_int(r2, 0x0, 0x1, &(0x7f0000005e00), &(0x7f0000005e40)=0x4) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) syz_mount_image$msdos(&(0x7f0000005e80)='msdos\x00', &(0x7f0000005ec0)='./file0\x00', 0x3ff, 0x4, &(0x7f0000007100)=[{&(0x7f0000005f00)="1c47e4a733ce10943881e010f9bbed54e892485461bda74737c7f47a4fa72d647d31d663f39d585e6d158025031eca019f7cb308af7bd881bc25d6d3d08067ad6289254e640f55fa39402a35cfba60ce87a4878751bc9231e6d64394393a19a379f25fd3e983d4", 0x67, 0x4}, {&(0x7f0000005f80)="be6344aafc9b641febd68479e17156e57032cac62ee8f1fd3653eaa84f65c2c034e01072733a5b0aff7f16e9c17b9fc567b2769607abc71765ba52c2ecc3705275a39a8a9399f9ffac2710d072a1a6002750be", 0x53, 0x80}, {&(0x7f0000006000)="7b81daf20f34787746f639d40f94db62827ea31309307cdfd481b01a03c371d6b87e233b51631632905ed83478486fc77174b17937e0ac9777c911876f32a205168d63624395d422a80cf01cc7aa54a44f44a887beb014eab1be1da7cf3d2a995d017794c1a5c458ba17d895d1e33635f222c35c16713e935286368b322444827020d034dc36744ec1caf162808cc1b12e634520747e91e085ae535bff76b43a4504c51fb97a26aa4afc8f9750168260834b17278c3ea7f18545a914e468c1a194787f71dcb9532f146a5748b46ca47da721853c8cbc6adef00fddbd05", 0xdd, 0x6}, {&(0x7f0000006100)="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", 0x1000, 0xffff}], 0x214403, &(0x7f0000007180)={[{@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@check_normal='check=normal'}, {@nodots='nodots'}], [{@pcr={'pcr', 0x3d, 0x25}}]}) [ 1359.924758] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10fff3, &(0x7f0000000100)) [ 1359.978622] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1360.030739] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:48 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:semanage_exec_t:s0\x00', 0x25, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1360.083948] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = memfd_create(&(0x7f0000000100)='trustedwlan1lo\x00', 0x1) clock_gettime(0x0, &(0x7f0000001740)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000300)=[{{&(0x7f0000000280)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/136, 0x88}, {&(0x7f0000001480)=""/175, 0xaf}, {&(0x7f0000001540)=""/245, 0xf5}, {&(0x7f0000000140)=""/22, 0x16}, {&(0x7f00000001c0)=""/13, 0xd}], 0x6, &(0x7f00000016c0)=""/95, 0x5f, 0xb28}, 0x200}], 0x1, 0x3a52e24df4e5a85c, &(0x7f0000001780)={r1, r2+10000000}) sendmsg$xdp(r0, &(0x7f0000002c80)={&(0x7f00000017c0)={0x2c, 0x7, r3, 0x40}, 0x10, &(0x7f0000002c00)=[{&(0x7f0000001800)="a1", 0x1}, {&(0x7f0000001840)="2f091b6efc9da562d421c04e00e117f44928e421a57c354c027d93891f71254de3f11a1480caf592c52e5cfe9a2b123a99d19de957001e369285eb231ca44614544a7817a18c6bdf79b62ed61e7b33f85be95f3edea1c6715ca622616cd19d5b9201a3843254cf941c3c2a443bbea7b3ab3757f83a286675277e6684f6f9fbf2ec514de228a02f8949c7c494396190730a57cf6fce5d4631b7bef3067759a964d327ecd72f516b5c2e535b91618c2026349543bf157cd63a16934d8edb524e71945e", 0xc2}, {&(0x7f0000001940)="84c6df06e72ca1e7fff1519cae09bdf99df63f34e2b7396a7a67b74c08578a23513c205184b636be8b6fc28e5e68b12084863d8aa766895019587f18f8d138835fca4a08075389976cb430c1085592e6efd6d550d362e39daa53f71dd7de80693da7ac0fadbe91fda2bb13f72897e2f1040f61fe47f66811eac39e1f5922fad411d71274623a", 0x86}, {&(0x7f0000001a00)="664d347160f0a78a1d67456e8d7fded963b51545b0501e0680626d1cc226d4f8727296b85e8e92096edf8c9c124527e6c0bf8cd0fb5767f9cc43a4b394b6d750de198a6cdd5e91c7df9fc61d36877221fd40fdb2d10b89b97acd44de12b0ebc262106735b1ecf7b4f505599a930a997e09d15334f6d8ac8f0d12f5d356b1beddc7aa46ae41878c118518e483366ae3ffd95f36737959cc03fae97a43e09854801bc4b90d92b12651e976ebd089cc", 0xae}, {&(0x7f0000001ac0)="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", 0x1000}, {&(0x7f0000002ac0)="2412153be32bc67e7b835b57179ede23c88e6ed01a8db77932e8c830bde012878c15af9f25a05d933dc7dd2729beb0b28d28e9c136bc55115e27997f1a4b6adab634d43accfd787d0d8a1f4131c27d25ef21c4e31143dc64b11f7e70d37d53c418f1867a66bfe026bc90d5446afa2be8035ca1846004d9e9dd44de48900b3ea598685692f366d5f5b3ae8c", 0x8b}, {&(0x7f0000002b80)="e62bc3575ec350982264db2c48c80711d5882385edcad1e0c313a20751189e9271d096bd92f6414707c575048b70", 0x2e}, {&(0x7f0000002bc0)="8a55d4eed40a0cddd2d7eb26931d360f39799bfd55985eb624a592d81f8d86c27e3beba212ea549b0bdaeffefadfb1f4b22f3b79bfe19399adcf47aaf60e3f", 0x3f}], 0x8, 0x0, 0x0, 0x480c5}, 0x0) 03:51:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104005, &(0x7f0000000100)) 03:51:48 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:48 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x2) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20000, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x4000) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000400)={0x400, 0x5, 0x0, [{0x80000001, 0x100000000, 0x1, 0xd398, 0x0, 0x3ff, 0x3}, {0xdfc, 0x8, 0x2, 0xfffffffffffffffc, 0x4, 0xf1a, 0x200}, {0x5, 0xfffffffffffffffa, 0x9, 0xfff, 0x5, 0x5cf5, 0x1}, {0x9, 0x6, 0x98, 0x800, 0x200, 0x101, 0x5}, {0x8000, 0x800, 0xffffffffffffffff, 0x6, 0xffffffffffffff80, 0x16a, 0xfffffffffffffffe}]}) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x281, 0x0) bind$unix(r0, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1360.348984] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1360.438846] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:49 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141400000000]}], 0x10) 03:51:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108019, &(0x7f0000000100)) 03:51:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x4) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000001980)) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) r3 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f80)='cgroup.type\x00', 0x2, 0x0) r4 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0x4, 0x1, 0xdd, 0x3, 0x0, 0x2, 0x0, 0x2, 0x3, 0x800, 0x9e, 0x1, 0x7ff, 0x0, 0x3, 0xfffffffffffffffb, 0x7, 0x3f, 0x1, 0x8, 0x0, 0x2, 0xe14e, 0x2, 0x74e, 0x2d3f, 0x0, 0x1, 0x1, 0x7, 0x2, 0x3, 0x860, 0x1ff, 0x8, 0x4, 0x0, 0xca4c, 0x3, @perf_config_ext={0x40}, 0x4000, 0xffffffffffffffff, 0x9d41, 0x0, 0xfffffffffffff000, 0xffffffff000000, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r5 = syz_open_dev$midi(&(0x7f0000002040)='/dev/midi#\x00', 0x9, 0x10001) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = accept4$llc(0xffffffffffffff9c, &(0x7f00000020c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000002100)=0x10, 0x800) r8 = accept4$nfc_llcp(0xffffffffffffff9c, 0x0, &(0x7f0000002140), 0x80800) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f00000021c0)={0x0, 0x80000, 0xffffffffffffff9c}) socketpair$inet(0x2, 0x5, 0x1, &(0x7f0000002200)={0xffffffffffffffff}) r12 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000002240)='tasks\x00', 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002280)={0xffffffffffffffff}) r14 = openat$autofs(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/autofs\x00', 0x10080, 0x0) r15 = open(&(0x7f0000002300)='./file0/../file0\x00', 0x0, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340)={0x0}, &(0x7f0000002380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000023c0)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f00000024c0)=0xe8) getgroups(0x6, &(0x7f0000002500)=[0xee00, 0xee00, 0xee00, 0xee01, 0xee00, 0xffffffffffffffff]) r19 = accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14) r20 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) r21 = socket$nl_crypto(0x10, 0x3, 0x15) r22 = socket$key(0xf, 0x3, 0x2) r23 = openat$full(0xffffffffffffff9c, &(0x7f0000002680)='/dev/full\x00', 0x40, 0x0) r24 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000026c0)='cgroup.threads\x00', 0x2, 0x0) r25 = socket$vsock_dgram(0x28, 0x2, 0x0) r26 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r27 = syz_open_dev$adsp(&(0x7f0000002700)='/dev/adsp#\x00', 0x10000, 0x2000) r28 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002740)='/dev/ppp\x00', 0x0, 0x0) r29 = socket$inet(0x2, 0x80803, 0x9) r30 = open(&(0x7f0000002780)='./file0/../file0\x00', 0x800, 0x40) r31 = accept4$inet(0xffffffffffffff9c, &(0x7f00000027c0)={0x2, 0x0, @dev}, &(0x7f0000002800)=0x10, 0x800) sendmsg$unix(r0, &(0x7f0000002940)={&(0x7f0000000540)=@file={0x1, './file0/../file0\x00'}, 0x6e, &(0x7f0000001900)=[{&(0x7f00000005c0)="f962120f27333019d4d76d8e28ad21822bd95ee5b2eb86711c9991aa943170ce83bf29829f991aa5697e404806c167808f20900f0455eb2909a5572f1c20e4e40969e4ecab636533b728f58ac3a56ce4223b24c672e9044573e0bdb8eae2e087ae6954a7f8069b7029ce4494142a07465a241c1ec1c1567df1710547fe7d8db091f2141f9a140b5511418a170942b086faf718d8ee865f6873a87e41887a83fce4e12295a1e20e6747e6b2a6e348e5599dd5c08ed7c546558e50f324fe32803b4b602c41bedaa26e40df56673939289367410826229e04d868da28af29a5c613eea9f6fa8565b6cc168ec158", 0xec}, {&(0x7f0000000300)="a0abaa6250195ec421ab7096100d03bafba9dd9cc2e9ccb0f7e5b255077b247a0dcf0aa6ee", 0x25}, {&(0x7f00000006c0)="af89a854c053419ea8fd92983f0c6e7c5cb68794bc93978d1252e3c3036b7cddf8eef9897fee9e2abd1382876504b703774210d43d5be07743a8590107508690adfcbe39ca12e72a5aaff31ce7da14f0565e11", 0x53}, {&(0x7f0000000740)="819f737ef0b05b6d6d0a27e1e96f841f69fff61b6531faf198ac7c100ea8158077188b062951cb4340a6e4749fc84c96442d5398e54bb3e4c9765e62535a73f3b8b5fcbcc575bc43712ab85d55269db637747174362134104822340e60e5c48791678f8e7ec5e6ad08794a33c55756409771ff03c37740a17ea459321adb527233875ba80ab9f531f7", 0x89}, {&(0x7f0000000800)="55335f1a9225dba6197acb2f948f06a551e4a47e331438fc241dfbe1fcb678af6ec9c7a1a1bba1873eb3110a831070f726496d70b79022fe9a84c02efb5de15e5f30a6b94a8002b74debc39ff3a93343942bd605140e3b5d5dee468bdc5c850acc660896a4cc71a6ba69293a81a06484694d6277346a56330ed9ced261860df0f0bc0761f94f2332a7724ff4881373a52132754687ea8e16ab74354fdcc2b521683dc435645c22f4ea16fc2ea9735e0c6a298cf20329508fbcacbe9de90ee93f200c4456d43f6465106d6ec2dee25387a2ea3ac8bd7dce969155e2f567", 0xdd}, {&(0x7f0000000900)="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", 0x1000}], 0x6, &(0x7f0000001bc0)=ANY=[@ANYBLOB="2174711800000000000000010000a34c1748c9a164316861a9fd8e24a44bbcc77a009962c1b7c03ed8317466b665a444659461582065", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="38000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r19, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25, @ANYRES32=r26, @ANYRES32=r27, @ANYRES32=r28, @ANYRES32=r29, @ANYRES32=r30, @ANYRES32=r31, @ANYBLOB="2b6acd04017b13ec20521fe1c3a08a18b34d2c8069d152db0579f31c71cfa70cd5580b1a75e00294a5a120a7c7168369e11e4bf9582313744d213fa6ace7979108af6f51b94d32638e9e6062ef65756640008d69d12de28aeb0250499055e47a5d38afca3b43791e55bc3e1a12a296d9ef4b8f46f78f5c19e5c2f096046e7e207da27632e4f1f2124a4224c714877627ab7b90e6dc5ac3d6a4e6568ceba0cb33aa31ed412d"], 0x100, 0x44}, 0x811) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="6a71666d743d760d6e26107d01667376312c005e9fa7c4847700d95e37d76f5b35377b5c06545ab100fe3671f5d9103fa4"]) 03:51:49 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2d00, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:49 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)={{r1, r2/1000+30000}}) statfs(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000240)) [ 1360.858034] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1360.895616] EXT4-fs: 13 callbacks suppressed 03:51:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c004, &(0x7f0000000100)) [ 1360.895628] EXT4-fs (sda1): Unrecognized mount option "jqfmt=v n&}fsv1" or missing value 03:51:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:49 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2ac5974d, 0x8000) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x4}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000003c0)={r1, 0x100000000}, 0x8) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) getpeername$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000040)=0x1c) r3 = getpid() fcntl$setown(r0, 0x8, r3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000400)=@ethtool_sset_info={0x37, 0x100000000, 0xffffffffffffffc0, [0x200, 0x0, 0xd3b6, 0x40d]}}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000480)={0x18, 0x4, 0x4, 0x8, 0x3d1}) r4 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0xffff, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r4, 0x40206417, &(0x7f0000000080)={0x6, 0x33d, 0xffffffffffff7fff, 0xffff, 0x1e, 0xff}) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x81, 0x141800) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad0, &(0x7f00000003c0), 0x100020, &(0x7f0000000300)={[{@init_itable='init_itable'}]}) [ 1361.005038] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1361.030884] EXT4-fs (sda1): Remounting filesystem read-only 03:51:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10801f, &(0x7f0000000100)) [ 1361.136454] EXT4-fs (sda1): Unrecognized mount option "jqfmt=v n&}fsv1" or missing value 03:51:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:50 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x185) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xa, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0xf, 0x6, &(0x7f0000000080)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001440)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0x740c42f0cf1fbb3a}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff43, &(0x7f00000013c0)}, 0xfffffffffffffd3b) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:51:50 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141200000000]}], 0x10) 03:51:50 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4800, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:50 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000500)='nilfs2\x00', 0x1012, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f00000002c0)=ANY=[@ANYBLOB="6a71666d745b76267376312c007b4ab19b747e8070f9d966fb5ae7554f0180693f1f50b41db292a5385e01008bcbacc43cc31bebf2c14cf10c3bb6822fde9f9d2e101d99487a1d71492977b87de964df6db795922c5135a582b6d790e994593ecb123e86680d8f1a9e55fb326c618f"]) syz_mount_image$ceph(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000003c0)="bffca1671c10ef987cfe69e7e63721d82ac75bb5f78538f941e12513c555f0bbce3fb03460211433db90bdee07b30958f514c003af28d94b4b1256c5119b9cb3fc3079f65a3baea89f5f0430bce3759b64b98db35d1933b20ecabb90893ec8ea10aae1c7ede85388d292504e15969c7269b67b60e9e601325b01c747367db5d971636f758088e5ac769a1aca2523c37864f3b450ce7b47f15f7c5d78529ef93daf5127efb8f51dfe765e0b04becd04421cd012f30cbb17bc0e94e20b49084be98911d3cafc2b61ec8f3aeb36d7c14ac71b1f4f160ce7c0d2aa9d5503c2c6ac60be1959d76cd6b652be86b50706e71f8b", 0xf0, 0x6}], 0x200000, &(0x7f0000000280)='keyringppp1eth0:trusted\x00') 03:51:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10000f, &(0x7f0000000100)) 03:51:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10401e, &(0x7f0000000100)) [ 1361.771665] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1361.802812] EXT4-fs (sda1): Unrecognized mount option "jqfmt[v&sv1" or missing value 03:51:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1361.875095] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1361.899896] EXT4-fs (sda1): Remounting filesystem read-only 03:51:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1361.952277] EXT4-fs (sda1): Unrecognized mount option "jqfmt[v&sv1" or missing value 03:51:50 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffffe, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:50 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x185) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xa, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0xf, 0x6, &(0x7f0000000080)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001440)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0x740c42f0cf1fbb3a}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff43, &(0x7f00000013c0)}, 0xfffffffffffffd3b) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:51:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x40000000001) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) [ 1362.254416] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1362.281582] EXT4-fs (sda1): Remounting filesystem read-only [ 1362.334217] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1362.342248] EXT4-fs (sda1): Remounting filesystem read-only 03:51:51 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x2c010000]}], 0x10) 03:51:51 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104014, &(0x7f0000000100)) 03:51:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:51 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x185) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xa, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0xf, 0x6, &(0x7f0000000080)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001440)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0x740c42f0cf1fbb3a}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff43, &(0x7f00000013c0)}, 0xfffffffffffffd3b) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:51:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1362.623830] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:51 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10800e, &(0x7f0000000100)) [ 1362.709057] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1362.727577] EXT4-fs (sda1): Remounting filesystem read-only 03:51:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x0}], 0x1, 0x0) 03:51:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='jqfmt=vfsv1', &(0x7f00000001c0)='-wlan0,\x00', &(0x7f0000000280)='\x00'], &(0x7f0000000480)=[&(0x7f0000000300)='^eth1[nodev)eth0\x00', &(0x7f00000003c0)=':,\x00', &(0x7f0000000400)="69fc20d5b7", &(0x7f0000000440)='mime_type{trusted\x00']) 03:51:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7a000000, 0x18}}, &(0x7f0000000780)=""/130, 0x1a, 0x82, 0x1}, 0x20) 03:51:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf8f73f0000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1362.880640] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1362.891368] EXT4-fs (sda1): Remounting filesystem read-only [ 1363.012045] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:52 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x400000000000000]}], 0x10) 03:51:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x7, 0x0) 03:51:52 executing program 0: setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000540), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="100000aeb759ae0017010007006e2f66696c6530bc7cba93195a3498"], 0x1c) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f000040e000/0x1000)=nil}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x5, 0x8000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x1, 0x6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000000}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000200)={r4, 0x5, 0x30}, &(0x7f0000000240)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000400)="0f01df0f00d8c4c3615f2d1c3400009e0f72d105b9b10600000f32f30f013e0f180f653e6666660f3a21922cde00000edfd20f236a", 0x35}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$RTC_VL_CLR(r3, 0x7014) 03:51:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c01a, &(0x7f0000000100)) 03:51:52 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x800, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000440)={'security\x00', 0x100001b4}, 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000140)=0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:52 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x20000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1363.489430] Unknown ioctl 21526 03:51:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x9, 0x0) [ 1363.518161] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1363.533708] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c01b, &(0x7f0000000100)) 03:51:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x4, 0x0) [ 1363.622854] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1363.634422] Unknown ioctl 21526 03:51:52 executing program 0: syz_open_dev$binder(&(0x7f0000002340)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x2000020000000c) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getegid() [ 1363.694382] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x301, 0x0) 03:51:52 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8000a0ffffffff, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1363.900256] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:52 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14140b]}], 0x10) 03:51:52 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) mount$9p_unix(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x80000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d756e69782c6d73697a653d3078303030303030303033373536343662642c6163636573733d616e792c646f6e745f686173682c736d61636b6673726f6f743d73656375726974792e73656c696e7578002c657569643ed3a101d480f979ed79df62f05d65ff", @ANYRESDEC=r0, @ANYBLOB=',\x00']) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00qfmt=vfsv1,\x00']) 03:51:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c009, &(0x7f0000000100)) 03:51:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0xa, 0x0) 03:51:52 executing program 0: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xa, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0x740c42f0cf1fbb3a}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:51:52 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4800000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x2, 0x0) [ 1364.394693] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1364.406046] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:53 executing program 0: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xa, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0x740c42f0cf1fbb3a}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:51:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108013, &(0x7f0000000100)) [ 1364.456800] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) fcntl$setsig(r0, 0xa, 0x1e) 03:51:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x5, 0x0) 03:51:53 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2d000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1364.678875] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1364.738080] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:53 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x4800000000000000]}], 0x10) 03:51:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5, 0x18}}, &(0x7f0000000780)=""/130, 0x1a, 0x82, 0x1}, 0x20) 03:51:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x8, 0x0) 03:51:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100010, &(0x7f0000000100)) 03:51:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x200, 0x3, &(0x7f0000000540)=[{&(0x7f00000003c0)="02d9fd5aab9ee84ce61103d79762a963ea701d257131d0d7372a51964050703467ab8e41126e978d9a79d69abd2bd86945174adbb3ca9cc28f92efff4fd32c40a22d029a3ab26603686cbd098d6e1768c0d8643e2d565c926b485371c6dbe1035cb89b41bfff1bf0da39505e032548dc86f2cc46d16efd199e67448f46cd2f64513b2379c9bd7acfcd9239f6492441729b3f4c811377f2e8820a3087dbbd3ae29b5633d3b3abcf9aa7a21fbaa8e4c5272bef2d54897892be1452b7b88b1ee9596bf51a1d37be", 0xc6, 0x38}, {&(0x7f00000001c0)="5bfc6b6649a1afc0cc91abd3c0505948038590c6e05512", 0x17, 0x7ff}, {&(0x7f00000004c0)="83e4341c9b161f8b9f2606636fe09bb72d9d6153d7e17db490e96649ae7dfa2407c454f427e760ff960c2140de52ba80b684dde7912bd3c8823fdf51737537456e97da5701b7e36ecc3ea153e92cab88dd9fa3fef7178f4fe55c77d3095d091aee81ed44be783c8f2b1db7f24ce9f52d2699550fa9d82d", 0x77, 0x8000}], 0x100800, &(0x7f0000000740)={[{@datacow='datacow'}, {@noacl='noacl'}], [{@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef'}}, {@smackfsroot={'smackfsroot', 0x3d, 'bpf\x00'}}, {@euid_gt={'euid>', r0}}, {@euid_lt={'euid<', r1}}]}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000100)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0xfffffffffffffffd) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:53 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x80000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x3, 0x0) [ 1365.259090] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:53 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) set_thread_area(&(0x7f0000000280)={0x6, 0xffffffffffffffff, 0x1000, 0x313, 0x9, 0xff, 0x2, 0x3, 0x2, 0x5}) lsetxattr(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.nlink\x00', &(0x7f00000001c0)="69fc20d5b7", 0x5, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:51:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100012, &(0x7f0000000100)) [ 1365.339659] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000140)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)={[{@abort='abort'}]}) 03:51:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x6, 0x0) [ 1365.413636] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x1000, 0x8000) name_to_handle_at(r0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000001740), 0x1400) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) symlinkat(&(0x7f0000001780)='./file0/../file0\x00', r0, &(0x7f00000017c0)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x8000, &(0x7f00000005c0)={[{@mode={'mode', 0x3d, 0x1000}}], [{@measure='measure'}, {@euid_gt={'euid>', r1}}, {@obj_user={'obj_user', 0x3d, 'security.selinux\x00'}}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'securitynodev,self[--[[-posix_acl_access{mime_typeeth0cpusetlo-'}}, {@smackfsroot={'smackfsroot', 0x3d, 'security.selinux\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'bpf\x00'}}, {@dont_hash='dont_hash'}]}) [ 1365.632913] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:54 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac141417]}], 0x10) 03:51:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0xb, 0x0) 03:51:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10001b, &(0x7f0000000100)) 03:51:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6800, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:51:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f0000000bc0)=0xe8) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/dsp\x00', 0x105000, 0x0) stat(&(0x7f0000001040)='./file0/../file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000f80)='./file0/file0\x00', &(0x7f0000000fc0)='fuseblk\x00', 0x0, &(0x7f0000001100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1a00}}], [{@hash='hash'}, {@uid_eq={'uid', 0x3d, r0}}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute'}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r0}}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) r4 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0x1) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x101, 0xa, &(0x7f00000009c0)=[{&(0x7f0000000280)="eafc02cf475bf3e1b7998cc7ab96c52ced1341a54425aac3ad9477881bc9322b8b44728d61221adcd81102e78588c7d293b299978b33edc0228664dce6fa5cdda3881d330c8c8c303343a6e6584e155c1fe6203814d3fd9256ba11d556349c9be82b7ab6623c69fc27e2809d5e744c1b1992b4f44cba833b6696f3922333b1e08f0e746f80", 0x85}, {&(0x7f00000001c0), 0x0, 0x100}, {&(0x7f00000003c0)="4852c58e326c5775e1fbc73b3ca4368b1144ccba41cd60e2f30a2c81db015cfacdba5dad46ad63cef5cb", 0x2a, 0x3d}, {&(0x7f0000000400)="1d637adefa11f0332058ec45006906b334cd20be8bf1baa0049c289fe65a477b486233cb80e567dfd2a3a0b90517432f99446f723c35a8191bf584fcf2510f121b90216d843921a2e42ae46ad432265610d5f7ec69fb7e95016ce6e5f755d32ad805e04d513e42d47834dd7184d1677c49e0c87c7a244507e4d8cfecb65ca10856d3da0994a132f3fa1d3a35ad4a198ac1d79ce6bda845bc1e88f5e775db6328ee", 0xa1, 0x2}, {&(0x7f00000004c0)="99e31e24fa9cc3cda3b435f81a599d26cec8c614e771d168c4b01d08be8bdaaf0f75ca1028276d11012b6f456f274b7a5054e330b7a4c5e5884463d685d03f4070998db3bb1b7c3a9efb272d30833b3668ac39392671d97b77e7c2ddd91bf21fa2dd4c9cdbaa2ef64c4aed5e7f847be15e548f58e0051edce3e17aa8bda8e65e7199508ba8187c8fafd7a0ae31262f232d657035ed9a25c3b506c992bfcbcda75dbff0c1312aba9b4d517f61ac2208ceeb062e35a07aae68d5e5a4fde74937b8b77efb3f01edb5147498461b67", 0xcd, 0x2}, {&(0x7f00000005c0)="2ec205f1e599b9c6f8d22ca2f1e9e471e49b43e4fed2cb60f391a4013a55101cec", 0x21, 0xfffffffffffffffb}, {&(0x7f0000000600)="d1e9eb014433b8950952eb44b7d4d1d4fd65282fbcfefafc0b9fab532c7c088ccdf334b101b586376ed6ae4ebf0dfbab47a90ebc9b02fa436bce53695041cb655647848f2352768772b69a3bbde1febeb04bf5a3ad0389db9d9b199912484247c3373083222f749fbd646c9eaa98a26ce78f62a0cde1f49433d91c090a4ae324d6915aa929bdbaa032cbad0f5038f08ab86f219a15d0dc9cede436d17c3783a23b52b0ff2fc26a02a8f8d20a636a98888bc83588de64953a40ccd8ffc73079729c562827d84c2e9fa72de335f6a430eea2ea3c54", 0xd4, 0x6}, {&(0x7f0000000700)="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", 0xfd, 0x81}, {&(0x7f0000000800)="005cd5a56ac6fa16d917d5175695ed2ff27af370b5744a5e35a8a5ffe7cbc1c9484907883716017d8ffbb0f480ec72a2e31f8e5a54605ffd7b74cd5a2b2c50fd0b1e6a53262b17c47ea9c438406c93ca73b0ab072d5b46d1566d8245e2a1c85974c6c1f2f2d20826bd75ff4d8abc3340df74f93c13bdf71c3d2de8c8d00bd05e9613a9403da0d1a4d6df5d11b2da965782aea1d7bbce09c54abe6b4bd8963090199b07aed06f85bc1f74e82ab75f9dd755533adb662275ea55af2b8a44b61051f4df050102e0e615015311d370e46f0dbe9c8dbd", 0xd4, 0x5}, {&(0x7f0000000900)="7a3bf02b3e0ef5dd8cac08a64049c21b516fad2b43dd4b38f3c90e73198640236ecf4a85904827dd3a71d05f006b9361fda1291a48f69b72a58107b3df4caa940c9af8d13fe0f1a9b6dab81c43313f0c10976f5789fed0276b1d7156cd568ec3e06ef389c8cb0bf7da88f3088de0b16a718a1ace3b3960fe8835c07480c2f55128ff403be058742f32b767cd38708cc28e3bde42b4", 0x95, 0x2}], 0x1000000, &(0x7f0000000e80)={[{@suiddir='suiddir'}, {@norecovery='norecovery'}, {@quota_off='quota=off'}, {@noacl='noacl'}, {@statfs_percent={'statfs_percent', 0x3d, 0x2}}], [{@euid_lt={'euid<', r0}}, {@uid_gt={'uid>', r3}}, {@obj_type={'obj_type', 0x3d, 'jqfmt=vfsv1'}}, {@uid_gt={'uid>', r4}}, {@fowner_lt={'fowner<', r5}}]}) 03:51:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x8, @empty, 0x4}}, 0x9e, 0x100000000, 0xfffffffffffffffd, 0x28000, 0x1}, &(0x7f0000000100)=0x98) bind$nfc_llcp(r0, &(0x7f0000000480)={0x27, 0x1, 0x0, 0x0, 0x4, 0x8, "123346ecf4679a91c44790605b58fec105474290cb19270a0b7e8805e9e9fd0205556c7e1039f505cf312d91d655f4ac5c54a8e3b2532319a4a6837d662cb8", 0x18}, 0x60) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r1, 0x74, &(0x7f00000003c0)=[@in6={0xa, 0x4e21, 0x10000, @mcast2, 0x2469}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e21, 0x100, @local, 0x7a67fe05}, @in6={0xa, 0x4e23, 0x9, @empty, 0x800}]}, &(0x7f00000001c0)=0x10) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x60000, &(0x7f00000000c0)=ANY=[]) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_id=r2, 0x4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000540)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000580)=0x10) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000440)) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x400, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1366.115462] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:51:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f0000000bc0)=0xe8) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/dsp\x00', 0x105000, 0x0) stat(&(0x7f0000001040)='./file0/../file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000f80)='./file0/file0\x00', &(0x7f0000000fc0)='fuseblk\x00', 0x0, &(0x7f0000001100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1a00}}], [{@hash='hash'}, {@uid_eq={'uid', 0x3d, r0}}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute'}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r0}}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) r4 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0x1) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x101, 0xa, &(0x7f00000009c0)=[{&(0x7f0000000280)="eafc02cf475bf3e1b7998cc7ab96c52ced1341a54425aac3ad9477881bc9322b8b44728d61221adcd81102e78588c7d293b299978b33edc0228664dce6fa5cdda3881d330c8c8c303343a6e6584e155c1fe6203814d3fd9256ba11d556349c9be82b7ab6623c69fc27e2809d5e744c1b1992b4f44cba833b6696f3922333b1e08f0e746f80", 0x85}, {&(0x7f00000001c0), 0x0, 0x100}, {&(0x7f00000003c0)="4852c58e326c5775e1fbc73b3ca4368b1144ccba41cd60e2f30a2c81db015cfacdba5dad46ad63cef5cb", 0x2a, 0x3d}, {&(0x7f0000000400)="1d637adefa11f0332058ec45006906b334cd20be8bf1baa0049c289fe65a477b486233cb80e567dfd2a3a0b90517432f99446f723c35a8191bf584fcf2510f121b90216d843921a2e42ae46ad432265610d5f7ec69fb7e95016ce6e5f755d32ad805e04d513e42d47834dd7184d1677c49e0c87c7a244507e4d8cfecb65ca10856d3da0994a132f3fa1d3a35ad4a198ac1d79ce6bda845bc1e88f5e775db6328ee", 0xa1, 0x2}, {&(0x7f00000004c0)="99e31e24fa9cc3cda3b435f81a599d26cec8c614e771d168c4b01d08be8bdaaf0f75ca1028276d11012b6f456f274b7a5054e330b7a4c5e5884463d685d03f4070998db3bb1b7c3a9efb272d30833b3668ac39392671d97b77e7c2ddd91bf21fa2dd4c9cdbaa2ef64c4aed5e7f847be15e548f58e0051edce3e17aa8bda8e65e7199508ba8187c8fafd7a0ae31262f232d657035ed9a25c3b506c992bfcbcda75dbff0c1312aba9b4d517f61ac2208ceeb062e35a07aae68d5e5a4fde74937b8b77efb3f01edb5147498461b67", 0xcd, 0x2}, {&(0x7f00000005c0)="2ec205f1e599b9c6f8d22ca2f1e9e471e49b43e4fed2cb60f391a4013a55101cec", 0x21, 0xfffffffffffffffb}, {&(0x7f0000000600)="d1e9eb014433b8950952eb44b7d4d1d4fd65282fbcfefafc0b9fab532c7c088ccdf334b101b586376ed6ae4ebf0dfbab47a90ebc9b02fa436bce53695041cb655647848f2352768772b69a3bbde1febeb04bf5a3ad0389db9d9b199912484247c3373083222f749fbd646c9eaa98a26ce78f62a0cde1f49433d91c090a4ae324d6915aa929bdbaa032cbad0f5038f08ab86f219a15d0dc9cede436d17c3783a23b52b0ff2fc26a02a8f8d20a636a98888bc83588de64953a40ccd8ffc73079729c562827d84c2e9fa72de335f6a430eea2ea3c54", 0xd4, 0x6}, {&(0x7f0000000700)="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", 0xfd, 0x81}, {&(0x7f0000000800)="005cd5a56ac6fa16d917d5175695ed2ff27af370b5744a5e35a8a5ffe7cbc1c9484907883716017d8ffbb0f480ec72a2e31f8e5a54605ffd7b74cd5a2b2c50fd0b1e6a53262b17c47ea9c438406c93ca73b0ab072d5b46d1566d8245e2a1c85974c6c1f2f2d20826bd75ff4d8abc3340df74f93c13bdf71c3d2de8c8d00bd05e9613a9403da0d1a4d6df5d11b2da965782aea1d7bbce09c54abe6b4bd8963090199b07aed06f85bc1f74e82ab75f9dd755533adb662275ea55af2b8a44b61051f4df050102e0e615015311d370e46f0dbe9c8dbd", 0xd4, 0x5}, {&(0x7f0000000900)="7a3bf02b3e0ef5dd8cac08a64049c21b516fad2b43dd4b38f3c90e73198640236ecf4a85904827dd3a71d05f006b9361fda1291a48f69b72a58107b3df4caa940c9af8d13fe0f1a9b6dab81c43313f0c10976f5789fed0276b1d7156cd568ec3e06ef389c8cb0bf7da88f3088de0b16a718a1ace3b3960fe8835c07480c2f55128ff403be058742f32b767cd38708cc28e3bde42b4", 0x95, 0x2}], 0x1000000, &(0x7f0000000e80)={[{@suiddir='suiddir'}, {@norecovery='norecovery'}, {@quota_off='quota=off'}, {@noacl='noacl'}, {@statfs_percent={'statfs_percent', 0x3d, 0x2}}], [{@euid_lt={'euid<', r0}}, {@uid_gt={'uid>', r3}}, {@obj_type={'obj_type', 0x3d, 'jqfmt=vfsv1'}}, {@uid_gt={'uid>', r4}}, {@fowner_lt={'fowner<', r5}}]}) 03:51:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x300, 0x0) 03:51:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0xc0502) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000280)={{0x9, 0x10000}, {0xcd2, 0xffffffffffffffff}, 0x76, 0x4, 0x7f}) [ 1366.261024] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1366.291636] EXT4-fs: 12 callbacks suppressed [ 1366.291646] EXT4-fs (sda1): Remounting filesystem read-only 03:51:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x40000000) 03:51:55 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f0000000bc0)=0xe8) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/dsp\x00', 0x105000, 0x0) stat(&(0x7f0000001040)='./file0/../file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000f80)='./file0/file0\x00', &(0x7f0000000fc0)='fuseblk\x00', 0x0, &(0x7f0000001100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1a00}}], [{@hash='hash'}, {@uid_eq={'uid', 0x3d, r0}}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute'}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r0}}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) r4 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0x1) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x101, 0xa, &(0x7f00000009c0)=[{&(0x7f0000000280)="eafc02cf475bf3e1b7998cc7ab96c52ced1341a54425aac3ad9477881bc9322b8b44728d61221adcd81102e78588c7d293b299978b33edc0228664dce6fa5cdda3881d330c8c8c303343a6e6584e155c1fe6203814d3fd9256ba11d556349c9be82b7ab6623c69fc27e2809d5e744c1b1992b4f44cba833b6696f3922333b1e08f0e746f80", 0x85}, {&(0x7f00000001c0), 0x0, 0x100}, {&(0x7f00000003c0)="4852c58e326c5775e1fbc73b3ca4368b1144ccba41cd60e2f30a2c81db015cfacdba5dad46ad63cef5cb", 0x2a, 0x3d}, {&(0x7f0000000400)="1d637adefa11f0332058ec45006906b334cd20be8bf1baa0049c289fe65a477b486233cb80e567dfd2a3a0b90517432f99446f723c35a8191bf584fcf2510f121b90216d843921a2e42ae46ad432265610d5f7ec69fb7e95016ce6e5f755d32ad805e04d513e42d47834dd7184d1677c49e0c87c7a244507e4d8cfecb65ca10856d3da0994a132f3fa1d3a35ad4a198ac1d79ce6bda845bc1e88f5e775db6328ee", 0xa1, 0x2}, {&(0x7f00000004c0)="99e31e24fa9cc3cda3b435f81a599d26cec8c614e771d168c4b01d08be8bdaaf0f75ca1028276d11012b6f456f274b7a5054e330b7a4c5e5884463d685d03f4070998db3bb1b7c3a9efb272d30833b3668ac39392671d97b77e7c2ddd91bf21fa2dd4c9cdbaa2ef64c4aed5e7f847be15e548f58e0051edce3e17aa8bda8e65e7199508ba8187c8fafd7a0ae31262f232d657035ed9a25c3b506c992bfcbcda75dbff0c1312aba9b4d517f61ac2208ceeb062e35a07aae68d5e5a4fde74937b8b77efb3f01edb5147498461b67", 0xcd, 0x2}, {&(0x7f00000005c0)="2ec205f1e599b9c6f8d22ca2f1e9e471e49b43e4fed2cb60f391a4013a55101cec", 0x21, 0xfffffffffffffffb}, {&(0x7f0000000600)="d1e9eb014433b8950952eb44b7d4d1d4fd65282fbcfefafc0b9fab532c7c088ccdf334b101b586376ed6ae4ebf0dfbab47a90ebc9b02fa436bce53695041cb655647848f2352768772b69a3bbde1febeb04bf5a3ad0389db9d9b199912484247c3373083222f749fbd646c9eaa98a26ce78f62a0cde1f49433d91c090a4ae324d6915aa929bdbaa032cbad0f5038f08ab86f219a15d0dc9cede436d17c3783a23b52b0ff2fc26a02a8f8d20a636a98888bc83588de64953a40ccd8ffc73079729c562827d84c2e9fa72de335f6a430eea2ea3c54", 0xd4, 0x6}, {&(0x7f0000000700)="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", 0xfd, 0x81}, {&(0x7f0000000800)="005cd5a56ac6fa16d917d5175695ed2ff27af370b5744a5e35a8a5ffe7cbc1c9484907883716017d8ffbb0f480ec72a2e31f8e5a54605ffd7b74cd5a2b2c50fd0b1e6a53262b17c47ea9c438406c93ca73b0ab072d5b46d1566d8245e2a1c85974c6c1f2f2d20826bd75ff4d8abc3340df74f93c13bdf71c3d2de8c8d00bd05e9613a9403da0d1a4d6df5d11b2da965782aea1d7bbce09c54abe6b4bd8963090199b07aed06f85bc1f74e82ab75f9dd755533adb662275ea55af2b8a44b61051f4df050102e0e615015311d370e46f0dbe9c8dbd", 0xd4, 0x5}, {&(0x7f0000000900)="7a3bf02b3e0ef5dd8cac08a64049c21b516fad2b43dd4b38f3c90e73198640236ecf4a85904827dd3a71d05f006b9361fda1291a48f69b72a58107b3df4caa940c9af8d13fe0f1a9b6dab81c43313f0c10976f5789fed0276b1d7156cd568ec3e06ef389c8cb0bf7da88f3088de0b16a718a1ace3b3960fe8835c07480c2f55128ff403be058742f32b767cd38708cc28e3bde42b4", 0x95, 0x2}], 0x1000000, &(0x7f0000000e80)={[{@suiddir='suiddir'}, {@norecovery='norecovery'}, {@quota_off='quota=off'}, {@noacl='noacl'}, {@statfs_percent={'statfs_percent', 0x3d, 0x2}}], [{@euid_lt={'euid<', r0}}, {@uid_gt={'uid>', r3}}, {@obj_type={'obj_type', 0x3d, 'jqfmt=vfsv1'}}, {@uid_gt={'uid>', r4}}, {@fowner_lt={'fowner<', r5}}]}) [ 1366.379910] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:51:55 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x16, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1366.422882] device bridge_slave_1 left promiscuous mode [ 1366.428291] EXT4-fs (sda1): Remounting filesystem read-only [ 1366.428435] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.492674] device bridge_slave_0 left promiscuous mode [ 1366.499408] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.553512] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1366.569094] EXT4-fs (sda1): Remounting filesystem read-only [ 1366.645513] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1366.667939] EXT4-fs (sda1): Remounting filesystem read-only [ 1366.676862] team0 (unregistering): Port device team_slave_1 removed [ 1366.699858] team0 (unregistering): Port device team_slave_0 removed [ 1366.727264] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1366.808607] bond0 (unregistering): Releasing backup interface bond_slave_0 03:51:55 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f0000000500)=ANY=[]) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000001c0)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='data_err=ignore,data_err=ignore,grpid,stripe=0x00000000ffffffff,nodelalloc,resgid=', @ANYRESHEX=r0, @ANYBLOB='0x0, 0xfffffffffffffffa}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={r1, 0xfff}, &(0x7f00000002c0)=0x8) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10401c, &(0x7f0000000100)) 03:52:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x400000000000000) 03:52:02 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x500000000000000) [ 1374.216924] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1374.235178] EXT4-fs (sda1): Remounting filesystem read-only 03:52:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104016, &(0x7f0000000100)) 03:52:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xe0000000) 03:52:02 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x68000000, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1374.298168] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1374.333998] EXT4-fs (sda1): Remounting filesystem read-only [ 1374.375368] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1374.388827] EXT4-fs (sda1): Remounting filesystem read-only 03:52:03 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfeffffff00000000]}], 0x10) 03:52:03 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000100)={0x2}) 03:52:03 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xa000000) 03:52:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)="73797374656d74753a6f626a6563745f723a6e65746c6162656c5f6d67f2215f657865635f743a733000", 0xe, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1374.807079] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1374.821098] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1374.821564] EXT4-fs (sda1): Remounting filesystem read-only 03:52:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x300) 03:52:03 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) [ 1374.925525] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1374.944049] EXT4-fs (sda1): Remounting filesystem read-only 03:52:03 executing program 2: pipe2(&(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt(r0, 0x58, 0x1000, &(0x7f0000000b80)=""/130, &(0x7f0000000c40)=0x82) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r1 = geteuid() syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000780)={0x2, r3}) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000800)={0x800, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x0, 0x4, [{{0x2, 0x4e20, @remote}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e24}}, {{0x2, 0x4e24, @remote}}]}, 0x290) syz_mount_image$f2fs(&(0x7f0000000100)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x5, &(0x7f0000000600)=[{&(0x7f0000000280)="dda9a6519db95333ade453d7a2b316e7896ee86c32c61e3ed18922cb276c4765aca22633ce3799ea484a4eb2a0bdd062af37daedce7bd8f084c9f0e3674315ab0b25e9f4b630b974186ed5b86967efafb3b94e4373ab7e5253441c8593dcc4ae", 0x60, 0x9}, {&(0x7f00000001c0)="73fe9beb5949", 0x6, 0x5}, {&(0x7f00000003c0)="667937d032a8fd5dabfd86351ba381582283797309e921824f7b505353583fbea10e9072ff08cbb23733189f936292db429fc10685b4c545bf6493edcaf40111c3d68e10bdd02b24a6c7c1f166b89c8d9751a21ba6838f186e72763714b2", 0x5e, 0x7}, {&(0x7f0000000440)="810f9cb8c93af7e26096b83398783b99ae4ed5d1e45bcda6e7fb6b69f1b8fc8bc8adbdfbc6f4e7131fdeb65bb7d7fc0da0887d37f7155967065692282065239b17694383c671218ba4baa7a7290abc03109b55121361ae003e676dc42f92f2e9094f96f53188e98ab9425975d365c2ed87cf4550e6534ea111f41b2148070f68c5ca2a614c1943d3cc5df4c6f012aa0a99ff63ea821f4363be69a9fcd29fd5c4d5d4a328ee2aef426967817eef9b049f7a38701831d929d7772e430d2e495ea1959dd5fd9b4580bb2bc159ba7403240941487e2ae59a0d5cfd8d8d51b61ed849b9ddfc37ef49a554bc9363136e562799a7", 0xf1, 0x400}, {&(0x7f0000000540)="d0ddcb88cd7aeaca1b4377533d5eec37155b5737e5872bce5217ad5ed8090ea3d1cc9cbc98cb92555c5118ee7f30e5189fd0fe2bd836f2dddbdd367b3c2053ee2d6164a2a8dca9126258dcfd7b188b12474228f80f7170338804c03176c10d3c13d69d5a35a11cb22b06cf41e06538c8839ed2662eb63b4229e12f20083310bb35fdde67f4e214687c8d9b4630", 0x8d, 0x8}], 0x80001, &(0x7f0000000680)={[{@noextent_cache='noextent_cache'}, {@usrquota={'usrquota', 0x3d, ')vmnet0'}}, {@noextent_cache='noextent_cache'}, {@noheap='noheap'}, {@whint_mode_fs='whint_mode=fs-based'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0xe3b4}}, {@usrjquota={'usrjquota', 0x3d, 'nodev$/:}*wlan0#^'}}], [{@euid_gt={'euid>', r1}}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x6}, &(0x7f0000000ac0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000b00)={r4}, 0x8) 03:52:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x11) [ 1375.012509] device bridge_slave_1 left promiscuous mode [ 1375.018375] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.081835] device bridge_slave_0 left promiscuous mode [ 1375.095911] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.156205] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1375.204756] EXT4-fs (sda1): Remounting filesystem read-only [ 1375.257045] team0 (unregistering): Port device team_slave_1 removed [ 1375.286515] team0 (unregistering): Port device team_slave_0 removed [ 1375.316392] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1375.346005] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1375.377960] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1375.387793] EXT4-fs (sda1): Remounting filesystem read-only [ 1375.529326] bond0 (unregistering): Released all slaves [ 1376.722093] IPVS: ftp: loaded support on port[0] = 21 [ 1377.589999] bridge0: port 1(bridge_slave_0) entered blocking state [ 1377.596694] bridge0: port 1(bridge_slave_0) entered disabled state [ 1377.604650] device bridge_slave_0 entered promiscuous mode [ 1377.649827] bridge0: port 2(bridge_slave_1) entered blocking state [ 1377.656417] bridge0: port 2(bridge_slave_1) entered disabled state [ 1377.664773] device bridge_slave_1 entered promiscuous mode [ 1377.709722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1377.754878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1377.888703] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1377.936950] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1378.149486] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1378.158166] team0: Port device team_slave_0 added [ 1378.202002] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1378.209399] team0: Port device team_slave_1 added [ 1378.253659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1378.301069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1378.347515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1378.395303] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1378.402980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1378.410912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1378.889718] bridge0: port 2(bridge_slave_1) entered blocking state [ 1378.896170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1378.902865] bridge0: port 1(bridge_slave_0) entered blocking state [ 1378.909233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1378.917095] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1379.371936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1380.668657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1380.837080] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1380.998982] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1381.005292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1381.021194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1381.176047] 8021q: adding VLAN 0 to HW filter on device team0 03:52:10 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c007, &(0x7f0000000100)) 03:52:10 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x5, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:10 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:52:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x5) 03:52:10 executing program 2: prctl$setmm(0x23, 0x3, &(0x7f0000ffc000/0x4000)=nil) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1, 0x101000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000001c0)={r1, &(0x7f0000000280)=""/161}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, r0, 0xfffffffffffffffe, 0xffffffffffeffffe}, 0x10074) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) fremovexattr(r0, &(0x7f00000003c0)=@known='system.sockprotoname\x00') 03:52:10 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x141414ac]}], 0x10) 03:52:10 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6, &(0x7f0000000580), 0x100020, &(0x7f0000000100)) 03:52:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x7) [ 1382.263679] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1382.282098] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1382.289684] EXT4-fs (sda1): Remounting filesystem read-only 03:52:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xfe80) [ 1382.405156] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1382.422938] EXT4-fs (sda1): Remounting filesystem read-only 03:52:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='vcan0\x00', 0x10) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = getuid() mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x30, &(0x7f0000000280)={[{@nfs_export_off='nfs_export=off'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_auto='xino=auto'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@euid_lt={'euid<', r2}}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, 'vcan0\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'vcan0\x00'}}, {@subj_role={'subj_role', 0x3d, 'eth0posix_acl_access*loproc'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) sendto$inet(r1, &(0x7f00000000c0)="db", 0x1, 0x0, &(0x7f0000000140)={0x2, 0x0, @rand_addr}, 0x10) sendto$inet(r1, &(0x7f0000000240)="df", 0x1, 0x4000010, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 03:52:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c011, &(0x7f0000000100)) 03:52:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xffffff7f00000000) [ 1382.485787] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1382.501115] EXT4-fs (sda1): Remounting filesystem read-only 03:52:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0x4002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xc0000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x1100000000000000) 03:52:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c00d, &(0x7f0000000100)) 03:52:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xffff0000) [ 1382.749646] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1382.761664] EXT4-fs (sda1): Remounting filesystem read-only [ 1382.824584] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1382.838164] EXT4-fs (sda1): Remounting filesystem read-only [ 1382.883876] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1382.893488] EXT4-fs (sda1): Remounting filesystem read-only 03:52:11 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac141415]}], 0x10) 03:52:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xffffffffa0008000) 03:52:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100009, &(0x7f0000000100)) 03:52:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1383.115556] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1383.217155] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1383.225397] EXT4-fs (sda1): Remounting filesystem read-only 03:52:12 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0x4002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:12 executing program 2: removexattr(&(0x7f0000000300)='./file1\x00', &(0x7f00000005c0)=@random={'user.', 'syz1\x00'}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = dup(0xffffffffffffff9c) write$UHID_CREATE(r0, &(0x7f0000000480)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000100)=""/82, 0x52, 0xca11, 0xfffffffffffffff9, 0x4, 0xfff, 0x701d50fd}, 0x120) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xfffffffffffffff9, 0x30, 0x976, 0x7}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0x80000000, @local, 0x3}}, 0x7fff, 0x1, 0x80000001, 0x7, 0x80000001}, &(0x7f00000002c0)=0x98) 03:52:12 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c000, &(0x7f0000000100)) 03:52:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x9) 03:52:12 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf5ffffff00000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x3f00000000000000) 03:52:12 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c016, &(0x7f0000000100)) [ 1383.485774] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1383.513582] EXT4-fs (sda1): Remounting filesystem read-only 03:52:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x700000000000000) [ 1383.597790] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1383.632025] EXT4-fs (sda1): Remounting filesystem read-only [ 1383.684203] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1383.696350] EXT4-fs (sda1): Remounting filesystem read-only 03:52:12 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14140e]}], 0x10) 03:52:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000006c0)={@local, @multicast1, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @dev, @broadcast}, &(0x7f0000000780)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14, 0x80800) r10 = accept4(0xffffffffffffffff, &(0x7f0000000b80)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000c00)=0x80, 0x80800) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000c80)={@rand_addr, @rand_addr, 0x0}, &(0x7f0000000cc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000e40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001000)=0x14, 0x800) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001040)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001240)=[{&(0x7f00000010c0)=""/63, 0x3f}, {&(0x7f0000001100)=""/64, 0x40}, {&(0x7f0000001140)=""/253, 0xfd}], 0x3, &(0x7f0000001280)=""/167, 0xa7, 0x9}, 0x60) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00', r11}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001440)={0x0, @broadcast, @multicast2}, &(0x7f0000001480)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000014c0)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @multicast2, @rand_addr}, &(0x7f0000001640)=0xc) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000016c0)={'bridge_slave_1\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000001840)={@dev, 0x0}, &(0x7f0000001880)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0}, &(0x7f00000019c0)=0x14, 0x80800) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000001ac0)={@dev, 0x0}, &(0x7f0000001b00)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xc080000}, 0xc, &(0x7f0000002400)={&(0x7f0000001b40)={0x8bc, r1, 0x820, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x238, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x98, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0xffff, 0xb66c, 0x10001, 0x8}, {0x8001, 0x100000000, 0x472, 0x1}, {0xffff, 0x5, 0x2, 0x10001}, {0x8001, 0x5, 0x0, 0x1}]}}}]}}, {{0x8, 0x1, r9}, {0xf0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe246}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0x148, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x1, 0x9, 0x9, 0x3f}, {0x2, 0x0, 0x5, 0x2}, {0x7, 0x1, 0x8b, 0x62}, {0x1ff, 0x5, 0x7, 0xed}, {0x4, 0x0, 0xfb64, 0x400}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffb}}}]}}, {{0x8, 0x1, r16}, {0x8c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x8, 0x9f4, 0x2, 0x2}]}}}]}}, {{0x8, 0x1, r17}, {0xb0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r19}, {0xac, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xdec}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r21}, {0x12c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xd33b}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r24}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r25}}}]}}]}, 0x8bc}, 0x1, 0x0, 0x0, 0x8011}, 0x20000000) r26 = socket$nl_generic(0x10, 0x3, 0x10) r27 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r26, &(0x7f0000000400)={&(0x7f0000000040), 0xc, &(0x7f00000003c0)={&(0x7f0000000000)={0x14, r27, 0x325}, 0xfe4d}}, 0x0) r28 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x280001, 0x1b) ioctl$TIOCSETD(r28, 0x5423, &(0x7f0000000100)=0x6) 03:52:12 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x300000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x100000) 03:52:12 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10002f, &(0x7f0000000100)) 03:52:12 executing program 2: mkdir(&(0x7f0000000240)='./file0/../file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)={[{@debug='debug'}, {@oldalloc='oldalloc'}, {@orlov='orlov'}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1060180}}, {@dax='dax'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1}}]}) 03:52:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x4000000) 03:52:12 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x2000000000000) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x100000001, 0x2100) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000180)) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f0000000540)=ANY=[@ANYPTR64, @ANYRES16, @ANYRESOCT, @ANYBLOB="48fe10cdc29d941c16c7ce775ff579ffd796e10a14479c0a4f213710bd1f4dbb38995833a72c152d2e6f6bf63dff4708794fd3a759fdfb3b644c1ebdba6a1e4854ea20774c3afe69fa9a0e4894090f98e1c571ddd5b7ed42f6fe22e79d8e150eb61ce2337dcf4ffdad484a891ab582c0d6b80903fc84e66819f73a88ac8f804ec73a3bb605c7cefedbe68a05ad9ee081ab07f47ef1cf6a17e7df059dd9c4d862bdb2b3d7cc"]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1384.020390] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:52:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000040)=""/84) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffffffff, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x3ff}]}}) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x6) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) 03:52:12 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108006, &(0x7f0000000100)) 03:52:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x3f000000) [ 1384.107880] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x1c) [ 1384.153984] QAT: Invalid ioctl [ 1384.172227] QAT: Invalid ioctl [ 1384.178304] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:13 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfeffffff, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c008, &(0x7f0000000100)) 03:52:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) close(r0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0xffffffff00000000, @dev={0xfe, 0x80, [], 0xf}, 0x536}, 0x1c) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x5926) 03:52:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xffffffff00000000) 03:52:13 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x23]}], 0x10) 03:52:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000000280)) quotactl(0x6, &(0x7f0000000100)='./file0\x00', r0, &(0x7f00000003c0)="0f30ddea4a10591530cfaabcfaffb5fe573218c0edf5f8ac76b213257efd13dfe55f130be3946b272f56e1d6f740c1e53370edff60ad98786bfe0430a5a9562a1c711dcd59460d8341b8387aefc75291ff7f62933c6899e63da87034739318e57acd5f16475794116ec930dbd979264cc17a1ac83ac6c223e7b126aefb76291ba869bf5fedbae9e769e56a603e192f8150632ef865261a44e94f9689e43f9a7a7886b7fb1b9c66a7aaeb62e84cf2c7f5f00e705f6be229a391932bd7cae807ec266794b878c1") 03:52:13 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x101) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000040)='net/ip_mr_vif\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000180)) mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{}, {0xfd, 0xea}]}, 0x14, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000006c0), &(0x7f00000002c0)) 03:52:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xffffff7f) [ 1384.904462] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x1000f4, &(0x7f0000000100)) [ 1384.961982] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:52:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xe000) [ 1385.006829] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r0 = getuid() syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000004c0)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}], [{@euid_gt={'euid>', r0}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x11}}, {@subj_type={'subj_type', 0x3d, "69fc20d5b7"}}, {@fsname={'fsname', 0x3d, "69fc20d5b7"}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_gt={'fowner>', r0}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, "0647504c"}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 03:52:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x80fe) 03:52:13 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x7400000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1385.170082] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x1000000) 03:52:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108014, &(0x7f0000000100)) 03:52:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x1100) [ 1385.454741] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:14 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x74]}], 0x10) 03:52:14 executing program 2: lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/snapshot\x00', 0x80400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0x150) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000700)=0xe8) mount$overlay(0x0, &(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000600)={[{@metacopy_on='metacopy=on'}], [{@fowner_lt={'fowner<', r0}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@euid_eq={'euid', 0x3d, r3}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r4}}, {@subj_type={'subj_type', 0x3d, "69fc20d5b7"}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x38, 0x31, 0x33, 0x37, 0x30, 0x37, 0x39], 0x2d, [0x37, 0x3e, 0x76, 0x37], 0x2d, [0x38, 0x7f, 0x3a, 0x77], 0x2d, [0x33, 0x0, 0x64, 0x76], 0x2d, [0x64, 0x61, 0x7f, 0x7f, 0x7c, 0x35, 0x35, 0x77]}}}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r5 = fcntl$getown(r2, 0x9) r6 = gettid() r7 = getpid() sendmsg$unix(r2, &(0x7f0000000dc0)={&(0x7f0000000a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000b00)="0f02407077faad236f09e38b21ae09c153f1bf69a91c9a31ba39ca943469f44070401d53686f16e62facd5da9d3e837c22a802a0a00c53b036f7cda919a6329c1af8c2daaa820c6d471dc843d9a0ff51ac31235b49fa8229d8bfaf98d0b76cd6bb0b7fc14caef61a2766c9ba5232e3255d8a74118399eb8ddb7dad1d23058a54c37a041413cd2ff4d93620ebda7267cc010aa7e4522ae5ac99a7a7202f81e182feb5ebd928bca80346ec32773dc362", 0xaf}, {&(0x7f0000000bc0)="e1aa3581bce8e95be854d03373d9e766dd88c91179e7ac521dc414f897efc7f563843545a914eab747a702a44c94c04be85eec8c16c1a81af7c75800174d392a192855875560c16f0173042d282763b961237be9a5c1528c28c7afc202e2b46108eb8d5d0bed7c3e7f7437d1f116bead1e4538b982c381f13cb00586a413532e83018b3299c35c", 0x87}, {&(0x7f0000000c80)="9b2d4387a31cbb7925d0476c4d25d24f55aca2d8a1a1fe3e615b9c6d203dd68bd4b0078ebb23a454f3783f3227c4daa43020511b3785a53b54d9744d3ca061bd228fc35e1bd93960", 0x48}], 0x3, &(0x7f0000000d00)=[@cred={0x20, 0x1, 0x2, r5, r4, r1}, @cred={0x20, 0x1, 0x2, r6, r3, r1}, @cred={0x20, 0x1, 0x2, r7, r0, r1}, @rights={0x28, 0x1, 0x1, [r2, r2, r2, r2, r2, r2]}, @rights={0x20, 0x1, 0x1, [r2, r2, r2]}], 0xa8, 0x4000000}, 0x800) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) syz_mount_image$hfsplus(&(0x7f00000005c0)='hfsplus\x00', &(0x7f0000000740)='./file0/../file0\x00', 0x1000, 0x2, &(0x7f0000000900)=[{&(0x7f0000000780)="e55dd4a57952cdd50f3228170aec721c845a942ce5c896087a5bce827d63e5de4540cde32b6ebb9dee2c5005cdfae90c0cf943c580af8fe3978481564e639f317c5649845f7d0572c633311e0928299b9c1821b32b68dabef39fb210ae6fbaaf2dfd8c64748dbf90b0e38d60e37ebaabfa0a1a7ee37a47da2847c6a9117467045105ab1de5113f58cf7590acb0420dfc5a2c86ce1065284f3603e570523a1e13bd42e337ca2aac7511bf72c08f050426fa137784303a189deedb", 0xba, 0x8}, {&(0x7f0000000840)="057c86b11a61b3f5b9c290d6678e69767330982f45b0feeb1bf598509aae60ca99bc928cc6562279faf3683d917af57baeec6a95987e79f5ecd1a7dc7c42dcdedda64433caeabdae1ed4d790e0a955ab66a79920dcb12a5fecffe71a8105ee078ad0a7e4d4d3690a8d6299612042a3e26bbe64bc92ca310e39bce67602649bbd54a615840e1f40", 0x87, 0x6}], 0x400, &(0x7f0000000940)={[{@uid={'uid', 0x3d, r4}}, {@nodecompose='nodecompose'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nobarrier='nobarrier'}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x5}}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, 'QUM-'}}, {@type={'type', 0x3d, "6678efda"}}, {@uid={'uid', 0x3d, r0}}], [{@dont_hash='dont_hash'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 1385.785441] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1385.799982] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1385.862722] hfsplus: unable to parse mount options [ 1385.904662] overlayfs: unrecognized mount option "fowner<00000000000000000000" or missing value [ 1385.944259] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1387.658535] IPVS: ftp: loaded support on port[0] = 21 [ 1388.421881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1388.428357] bridge0: port 1(bridge_slave_0) entered disabled state [ 1388.436026] device bridge_slave_0 entered promiscuous mode [ 1388.481894] bridge0: port 2(bridge_slave_1) entered blocking state [ 1388.488363] bridge0: port 2(bridge_slave_1) entered disabled state [ 1388.497264] device bridge_slave_1 entered promiscuous mode [ 1388.544476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1388.589854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1388.728291] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1388.777804] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1388.995898] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1389.003469] team0: Port device team_slave_0 added [ 1389.049251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1389.057194] team0: Port device team_slave_1 added [ 1389.101471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1389.150956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1389.199193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1389.246684] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1389.254383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1389.271946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1389.752940] bridge0: port 2(bridge_slave_1) entered blocking state [ 1389.759344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1389.766085] bridge0: port 1(bridge_slave_0) entered blocking state [ 1389.772508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1389.782020] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1390.201842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1391.542928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1391.716197] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1391.882071] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1391.888283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1391.905118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1392.065669] 8021q: adding VLAN 0 to HW filter on device team0 03:52:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10401a, &(0x7f0000000100)) 03:52:21 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfdfdffff, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xa) 03:52:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:21 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_buf(r0, 0x29, 0x2f, &(0x7f0000000040), 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000010207041dfffd946fa2830020200a0009000200001d85680c1ba3a20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x2, 0x4, 0x3, {0xa, 0x4e24, 0xf6c, @local, 0x9}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)="2b1adca95a57d7d35d4c8fc2933075a88e3075c66fbfb17f0226f78fbddf373c0b60ee6efe4b6546a0b3f0c55b2da19dedfb91294a160935d402aecbb959f9741fbe034c0626942a7c640592ea68686a34d148534201100edcda4d86224e2f3332d6b520375e06f2333e8c4e830953a00d99dd2f3a65d8d4861c77c59c599bfb4c914365849ba2b200104c8ffda32abc00990a9ed799f125", 0x98}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000140)="f1a0653fbf2e8b0c48e76cedcbf0b7df3834543759964885c65f6e2e59765f0ae275261ec86d159ac596e04eefcb1dcb3ee29390701cf8b39f0214d4ebcd91830ae630c840e0089892f24a63a567c64be06c86e4f2d541b4323ad144ce36a94561a7f1e45318acf78fb6efb0079fcaa537871ca1d7a5131dd929e90c726f2126c8889ed575c8c27a334c54120f8c5b3e2f4471229b8d1c7138410f84a0e79ccf697d6197465b956565fad177ccf4a6ad43d58d7a881a413a4e0e55419147d0e73b7964a51b9794c3c3f7839e4a1677edba", 0xd1}], 0x3, &(0x7f00000012c0)=[{0xb8, 0x107, 0x7fff, "f718fe146af7d77f7b017e7f34c347ff41365ea4860a43d95a8948f518c1e43ac5a1ec38c83a53a20226ff3c5204247d2cabba3142c2d04db5472f84e14cc8b0d9d1ecee98622bd0303789a505c0b278fd6d4f0cb1bf78719eeeec8877b3e5f019444ae7f4a2de038a25d142f90681ef703c0fd5f12b421033969251534aa44ac34419ac5d58edbdcfa3cfe67839e289fbc9aa03bd57dd6d276d0a43d34789a47e86"}, {0xa0, 0x10f, 0xd62, "005b765d43a752d8841ef940c0bbb5fa4b646515958ec2584be9b258a466f6c9c70728fe68cac56c6ea997ef94d3499b2220e637720105885e660b78c76a90eb0f53d6d87b3e759cd2e75712689410f9031bc9808df061c459b273e913f33d20682c1ab1c65e3b17bac0194cc13d04abfd3eb090b33745d5a2c7c0dc031cae376c0ea3fe380a2d013491d288836913"}], 0x158, 0x80}, 0x40) 03:52:21 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xe4ffffff00000000]}], 0x10) [ 1393.135275] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:52:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x3) [ 1393.175727] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. 03:52:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104001, &(0x7f0000000100)) [ 1393.223727] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. [ 1393.243108] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1393.266189] EXT4-fs: 10 callbacks suppressed 03:52:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) setxattr$security_evm(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f00000001c0)=@ng={0x4, 0x11, "4ad2fcff587ceeee11ef"}, 0xc, 0x3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000080)='\'eth0&\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001f9) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x10001, 0x80000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4001, &(0x7f0000527ff8)=0x1, 0x2, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0xfff, &(0x7f000041e000/0x1000)=nil, 0x2) [ 1393.266199] EXT4-fs (sda1): Remounting filesystem read-only 03:52:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x500) 03:52:21 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xfffffff6, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x700) [ 1393.362969] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1393.388285] EXT4-fs (sda1): Remounting filesystem read-only 03:52:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xa00000000000000) [ 1393.504996] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1393.541516] EXT4-fs (sda1): Remounting filesystem read-only 03:52:22 executing program 2: mkdir(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRESDEC, @ANYRES32, @ANYPTR64, @ANYBLOB="02deac19c1a49f49ab4d4f2a83ddd05cb1dae11176380e7f0c7704c8f839de715b807a8d4d708eaafa6bf1590e0e2560c25b54d90dab6abfa4f9127afefba60ce5061d79d96ccec86760d47a8425f89c9bc6f37c022e65b4df377acb2e95c3bcff424508bb48009cdf568592645f7420bff3f0c78c6a7727b7e2360bccc7f4c4402f38de753af97fef05c715b7aac59bf8527ab9cd51cc42f9d0480833c549bd3fc7e0bbf53ffec0a3e93102ff407e94853311df6f7be75c1273cbc811ff28b4f8e1d0c0b0f1336bbc1d04190b9a5ecdf0e8e930850467ba5eb3775a5fca93ef2072517347", @ANYRESHEX, @ANYRES32, @ANYBLOB="2500e27b0cca3c50084f28f715668b5b3f013ba18506373646625cbb348f972bd690799d974f22269cc8d4d947b98df7efe0aaea034aa0dcec9d3cef7733bd695daaba32824812d99f5da0ff24d3e43ba942fdee6d1110a2c0ccdb2bef1db4e5ab9b6dc12636f9f7a55468a310751e92a39e0f5ec91b4e1e10410c5c1b833b3ef35f8865b7b701a08d79ab204f3b6aecddd749d9e5063e7e50f9d1f3af350a8bde829e", @ANYRESOCT], @ANYRESDEC, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRES16, @ANYRES32, @ANYRES32, @ANYRES32]], @ANYRESDEC=0x0, @ANYRESHEX, @ANYBLOB="377616d946e0b21012e3cd9fd344fcfb4bf67800ca2bf430099ec0c507f3522beca8a15e95b338b4f1df556540452d1ce4655b152b3f2eaf01c1979fa9b43a168c3323d030c7d03e3dc532dd5ecbd2d51c0e059fde9d517822e799fc338833c3a3312ac285b18f5744982c1c65dfc4645843f32e5c8a52e01a6898598e6b6386c16f46dbb82c93cc9aaa251215e9e6f381253ecc9e185bdfec392f3a", @ANYPTR, @ANYPTR]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB='jqfmt=vfsv1\'\x00']) 03:52:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x10000000) [ 1393.694234] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1393.711138] EXT4-fs (sda1): Remounting filesystem read-only 03:52:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x1000000000000000) 03:52:22 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141f]}], 0x10) 03:52:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x300000000000000) [ 1393.952426] device bridge_slave_1 left promiscuous mode [ 1393.957992] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.014838] device bridge_slave_0 left promiscuous mode [ 1394.020491] bridge0: port 1(bridge_slave_0) entered disabled state [ 1394.030609] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1394.158638] team0 (unregistering): Port device team_slave_1 removed [ 1394.174740] team0 (unregistering): Port device team_slave_0 removed [ 1394.187301] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1394.249226] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1394.386925] bond0 (unregistering): Released all slaves [ 1395.773012] IPVS: ftp: loaded support on port[0] = 21 [ 1396.532201] IPVS: ftp: loaded support on port[0] = 21 [ 1397.041083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1397.054616] bridge0: port 1(bridge_slave_0) entered disabled state [ 1397.073474] device bridge_slave_0 entered promiscuous mode [ 1397.080757] device bridge_slave_1 left promiscuous mode [ 1397.087228] bridge0: port 2(bridge_slave_1) entered disabled state [ 1397.152733] device bridge_slave_0 left promiscuous mode [ 1397.158252] bridge0: port 1(bridge_slave_0) entered disabled state [ 1397.256663] team0 (unregistering): Port device team_slave_1 removed [ 1397.268873] team0 (unregistering): Port device team_slave_0 removed [ 1397.282863] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1397.339030] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1397.446734] bond0 (unregistering): Released all slaves [ 1397.523330] bridge0: port 2(bridge_slave_1) entered blocking state [ 1397.529803] bridge0: port 2(bridge_slave_1) entered disabled state [ 1397.552580] device bridge_slave_1 entered promiscuous mode [ 1397.639420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1397.685724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1397.952408] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1398.081309] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1398.408796] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.431579] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.439213] device bridge_slave_0 entered promiscuous mode [ 1398.479050] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1398.487069] team0: Port device team_slave_0 added [ 1398.531374] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1398.545457] team0: Port device team_slave_1 added [ 1398.552983] bridge0: port 2(bridge_slave_1) entered blocking state [ 1398.559608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1398.576295] device bridge_slave_1 entered promiscuous mode [ 1398.634552] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1398.671625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1398.700211] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1398.707226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1398.733250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1398.797520] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1398.804730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1398.822375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1398.832632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1398.912850] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1398.920015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1398.937337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1399.116060] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1399.222462] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1399.669864] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1399.677604] team0: Port device team_slave_0 added [ 1399.738397] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1399.746025] team0: Port device team_slave_1 added [ 1399.841932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1399.848831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1399.862322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1399.936966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1399.951840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1399.968977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1400.007464] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1400.014755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1400.033179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1400.054118] bridge0: port 2(bridge_slave_1) entered blocking state [ 1400.060514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1400.067176] bridge0: port 1(bridge_slave_0) entered blocking state [ 1400.073562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1400.092604] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1400.109646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1400.123003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1400.150309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1400.702176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1400.911175] bridge0: port 2(bridge_slave_1) entered blocking state [ 1400.917626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1400.924340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1400.930696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1400.947048] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1401.741609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1403.230358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1403.466677] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1403.695248] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1403.701697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1403.712148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1404.001318] 8021q: adding VLAN 0 to HW filter on device team0 [ 1404.096145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1404.377830] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1404.620579] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1404.641579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1404.648764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1404.921641] 8021q: adding VLAN 0 to HW filter on device team0 03:52:34 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100017, &(0x7f0000000100)) 03:52:34 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6c, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1405.934882] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1405.951720] EXT4-fs (sda1): Remounting filesystem read-only 03:52:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) futex(&(0x7f0000000540), 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, &(0x7f0000000600), 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000680)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @remote}}, 0x5c) 03:52:35 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) getpeername(r0, &(0x7f0000000280)=@ax25, &(0x7f0000000140)=0x80) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x8000a0) 03:52:35 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x300]}], 0x10) 03:52:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x9, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:35 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c006, &(0x7f0000000100)) 03:52:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x11000000) 03:52:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="1fe9"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1406.485689] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1406.489058] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1406.524852] EXT4-fs (sda1): Remounting filesystem read-only 03:52:35 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c005, &(0x7f0000000100)) 03:52:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xf0) [ 1406.597553] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1406.608892] EXT4-fs (sda1): Remounting filesystem read-only 03:52:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x600000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xfffffff5) 03:52:35 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000580)=@ethernet={0x0, @local}, &(0x7f0000000600)=0x80, 0x80800) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000740)={r2}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfffffffffffffffa, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="6d4c53d48f5b179e24f5f4773a0426ec1c2fe1387e6a0359f653ff38d7", 0x1d, 0x1}, {&(0x7f0000000280)="23fcb1a44aabc822f5bf4dc969541aedc988bc4e70be9a151ed12a843f90860e481709b20aa58a1ce3ea6ca48546b6cbcb966d9aa30b7e87e8034566a84f4bda95a9a420f8aac062abfdaf040ee4ffa9dc852620fd382523bb5e328ce212a6c8bfcff2726b08a4ec68f8468892d1f5d876b8ab84c1", 0x75, 0x2}, {&(0x7f0000000300)="b8c668ddef20b2ba84913d1fc866f113b2ff694e58fd4d2cb12e859f8f97", 0x1e, 0x2}], 0x60000, &(0x7f00000004c0)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@sb={'sb', 0x3d, 0xb97}}, {@commit={'commit', 0x3d, 0x4}}], [{@obj_user={'obj_user', 0x3d, 'em1}n:!]'}}, {@euid_lt={'euid<', r0}}]}) 03:52:35 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10401b, &(0x7f0000000100)) 03:52:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x800000000000000) [ 1406.899360] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1406.927306] EXT4-fs (sda1): Remounting filesystem read-only [ 1406.997608] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1407.021627] EXT4-fs (sda1): Remounting filesystem read-only [ 1407.151677] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1407.182478] EXT4-fs (sda1): Remounting filesystem read-only 03:52:35 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xa00000000000000]}], 0x10) 03:52:35 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10400c, &(0x7f0000000100)) 03:52:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xeffdffff00000000) 03:52:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x48, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1407.400413] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1407.413118] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1407.437963] EXT4-fs (sda1): Remounting filesystem read-only [ 1407.542130] device bridge_slave_1 left promiscuous mode [ 1407.547858] bridge0: port 2(bridge_slave_1) entered disabled state [ 1407.603571] device bridge_slave_0 left promiscuous mode [ 1407.610353] bridge0: port 1(bridge_slave_0) entered disabled state [ 1407.738711] team0 (unregistering): Port device team_slave_1 removed [ 1407.766261] team0 (unregistering): Port device team_slave_0 removed [ 1407.792036] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1407.827338] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1407.926329] bond0 (unregistering): Released all slaves [ 1409.032083] IPVS: ftp: loaded support on port[0] = 21 [ 1409.949091] bridge0: port 1(bridge_slave_0) entered blocking state [ 1409.955793] bridge0: port 1(bridge_slave_0) entered disabled state [ 1409.963600] device bridge_slave_0 entered promiscuous mode [ 1410.022559] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.029035] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.037290] device bridge_slave_1 entered promiscuous mode [ 1410.080002] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1410.123292] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1410.258255] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1410.308123] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1410.523421] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1410.530795] team0: Port device team_slave_0 added [ 1410.579813] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1410.587512] team0: Port device team_slave_1 added [ 1410.633247] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1410.681705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1410.730800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1410.779222] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1410.786464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1410.803797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1411.276116] bridge0: port 2(bridge_slave_1) entered blocking state [ 1411.282552] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1411.289216] bridge0: port 1(bridge_slave_0) entered blocking state [ 1411.295629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1411.303645] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1411.731653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1413.060250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1413.224785] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1413.390675] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1413.397497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1413.413959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1413.570281] 8021q: adding VLAN 0 to HW filter on device team0 03:52:43 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101001) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x63, 0x400000002}], 0x2a4) 03:52:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x100, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x3ff) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f00000003c0)=ANY=[@ANYBLOB="6a71666d743d76667376311f0080099ff66850dea8e1ee345038ed73ec20b2806746aece8a1cd157093ce1504cf0a63f593218545b7d16ef9bb07ae85faf595860b535ec712893eed05d2605366afdc8331bf6f1b6e458fec747a5270a7e4dbfc917583431ec3a1becff4e4094f5cf41de6230b24f676b477b811dcab36a3bb38fec078b487480ea1a8b305ac11a468f699c3ff39cb061d229b8f2e6c79052638790354eacf28d675ae7994bcb957d51537b40893d7540"]) 03:52:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x7000000) 03:52:43 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x101020, &(0x7f0000000100)) 03:52:43 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x2d00000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:43 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141f00000000]}], 0x10) [ 1414.612518] Unknown ioctl 1074294798 03:52:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x20000000) [ 1414.633102] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1414.662006] EXT4-fs (sda1): Unrecognized mount option "jqfmt=vfsv1" or missing value 03:52:43 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10801d, &(0x7f0000000100)) 03:52:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x2000) [ 1414.714398] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1414.725945] EXT4-fs (sda1): Remounting filesystem read-only [ 1414.770631] Unknown ioctl 1074294798 03:52:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ffe6"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xa00) 03:52:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file1\x00', &(0x7f0000000100)='bpf\x00', 0x6000ffc, &(0x7f00000001c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)) 03:52:43 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x40000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x8) 03:52:43 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100014, &(0x7f0000000100)) 03:52:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x200000000000000) 03:52:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) syz_mount_image$nfs(&(0x7f0000000100)='nfs\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x80, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="dc2750bbaace0dce56140500c7c1b8bea53a362918ae734d7ebea8bf995288e57bf730baaa8d4e41630dfa69eefe89e32a9094ae04937595e3efa2cc90459a74e85185fb9e1e8cb9f7da5670601607de2c1b79b77820b339c88db16972b80f3e478e8d4dfc5935325c0ee50f1c6a761621eb2c502224595f07eefa30b3b62520dff8cbe94d43b9306b613bf7fad15d355322b5b2e53f8a55d76d5ca23fcc55126eb0e94fa7ac63ff4f39dda243690dc8c219d4caaf021bdd026d237a5ef7c65a11f153d622", 0xc5, 0x3}, {&(0x7f0000000280)="e97f18a9cc037e52d7391174989593e706940a8a9c4ae783fe49341c0a4f266c6deb5521ee56c9e9d87aaec10ef904d11b6eaf9540dd2c15a2af6939fad668ec196e8c6ecef9b04358c1812d23947950fe9fd8e5675b6acace392f2107e1f18b1f1ffa09ee1bed980b88362f30985e", 0x6f, 0x7f}, {&(0x7f00000004c0)="5cd31e92663af8dec7b15d7bc434422b3af750a40d52586d60fbc782c68ccbd210d9d6e8263ab54557421536447df98a152f742c2312f33e0ee4b11c3d2b69790fec3cb29438db354ca0b6736073ed9b2a2ca5eae2bac9a73e76537bff068cf166752c91e020e2dd8c5958866c30cb30df1149a2f2ecea3f746d21ffae8aaa262e3793512cae5fb1e2b8de5fa5dc87d02776b1ac842439048fff0ad46d6b35be73deb882840e2331b7787323766f619604abfbe16bbfa480c94dd44cb56621fb9b42fc1975d5e2be99987532a2bfa48b947dfbc733683c01e70e", 0xda, 0x8}, {&(0x7f00000001c0)="ca41a5a7766621a026cfc2d56c4d8eca47b07928815bd2c1f76e6ba7650837d5ebc2f5af43c2", 0x26, 0x729}, {&(0x7f00000005c0)="0cac082fe4015399763aa214f0edfa47c5a6b813531f2e18b96cbcfcb6e381832654a6cefa4f98e028912d7438a3186471d8391e7be23c97c7dcacd2da6d0d85811fa137046b7ae6149fc5e56e8cbab7e59dc5392a29be4654809678bd051219aef41f928954959c979f15fa7dc7891543a5b1d8fc07a9eb8442ebdadacd4b87979b3f26df136708", 0x88, 0xfffffffffffffff8}, {&(0x7f0000000680)="a61d0ebf1b33d6ed345ef7221e1bfefe3390f0e0b062fd0d8be2d460bf094367ab4b1b4861e8ead71597668931d0feb61ffe87985040b55ff38624f595c7c10078e28bf7d8268000b8c52b47a1c0b5383eda3a3b5e6cb5abb06b0dbdf04cd8ff64bac84eedc8bd17195dc2704fe0b283add0efb314de1292141adae37afef0c2c20682701bfe70e0084533525848af7c75e93b326451bf07fe21c727c7851db0a42d3698591a6e92e916ad1b0d432b4e94a1709851d24427415d87a4ac37402c17e85a9916cb1cd862d9d40811a9840b5bf3f01da68b2485c81b0c624bcddee8", 0xe0, 0x3a8df335}], 0x0, &(0x7f0000000300)='jqfmt=vfsv1') mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) [ 1415.180166] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1415.198187] EXT4-fs (sda1): Remounting filesystem read-only [ 1415.288028] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1415.301724] EXT4-fs (sda1): Remounting filesystem read-only 03:52:44 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfcff000000000000]}], 0x10) 03:52:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x900000000000000) 03:52:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c013, &(0x7f0000000100)) 03:52:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1415.482231] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1415.511862] EXT4-fs (sda1): Remounting filesystem read-only [ 1415.564147] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1415.660008] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1415.673653] EXT4-fs (sda1): Remounting filesystem read-only 03:52:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ffe6"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xa0008000) 03:52:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x6, 0x7ad01) recvmmsg(0xffffffffffffff9c, &(0x7f0000000800)=[{{&(0x7f0000000280)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/74, 0x4a}, {&(0x7f0000000440)=""/148, 0x94}], 0x2, &(0x7f0000000500)=""/171, 0xab, 0x5}, 0x8000}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/97, 0x61}, {&(0x7f0000000640)=""/158, 0x9e}], 0x2, &(0x7f0000000700)=""/232, 0xe8}, 0x9}], 0x2, 0x1, &(0x7f0000000300)) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000880)={@local, @loopback, @loopback, 0xf46, 0x6, 0x101, 0x100, 0x6, 0x0, r1}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100005, &(0x7f0000000100)) 03:52:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0xffffffffa0010000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x5000000) [ 1415.899004] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1415.921519] EXT4-fs (sda1): Remounting filesystem read-only 03:52:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104015, &(0x7f0000000100)) 03:52:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xf5ffffff) [ 1416.037379] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1416.045740] EXT4-fs (sda1): Remounting filesystem read-only [ 1416.101421] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1416.125877] EXT4-fs (sda1): Remounting filesystem read-only 03:52:44 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141e]}], 0x10) 03:52:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x9) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)='security.selinux\x00', &(0x7f0000000200)='syst>m_u:object_r:useradd_exec_t:s0\x00', 0xffffffffffffffba, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES32, @ANYRESOCT], @ANYRESDEC, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="08d1941cce7e12f0211d60a25305778fc9d38d15b692cccd29cdae926a1b11ddfe907cb552e22eee4443e4323c34501e24f8c3e3e506bf4dd820183f9b6a65931205eec4f60bf149b21406433dd5a4def18518c245cc51043ca9a329246fc1bf3d005055b19df768d6", @ANYRES16, @ANYPTR64=&(0x7f0000000800)=ANY=[@ANYRES32, @ANYBLOB="3aa7da63d886d613c8bd411fa0d2c7a8e75790c2020025a0fea9ffac2289259e3e1fafa53b2753d954f5a2f190671ab45e32bc75340c31c2d94fc29efbddfbe69f2d48728dfbb13bd252170a2880d99de490bbbb22f7d2555ae9cc474e7c0413d1feaaa398c06a23700ba3879b77968d46b8023c5b2af201e808b763dd10e40c99174bc8683478acf8d1bc", @ANYRES64, @ANYRESOCT]]]) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x5, 0x5, &(0x7f0000000740)=[{&(0x7f0000000540)="0a4713d706cb79e310bf58407f038d8723017479a4a3af75a19149304956d303db47ad698d25aa6819b661f8f0670da0134e847d1cbfffac3012b776235e19f5c6eb618b3ff78dc99bbd17f1e5978220cb0163cdb9aecfb70b845d17198293686d6892227ca1fcbe8e4e505bd30c2ea3e5af7d61d57cc0b7681d43183a922367405701a0b2abc565ef4bda07", 0x8c, 0x6}, {&(0x7f00000004c0)="05280bbdcc027096722b84a3", 0xc}, {&(0x7f0000000600)="7ed8eb5f961e4b7bf27114", 0xb}, {&(0x7f0000000640)="4fd645e4725a627200025feb5470bb96f8fea46cb6b9b304fe650469a688d68d1b127f4a4c5ec35379c31b02374a75533f6e6326c51f95a984938f99700d8ca6758cce62721530a7c3e105ac18556f013b52a06e40c7cb30cfef7a4f0b57e99edbd3a33e473f5066a73b410fe40a37c27a8f553f3c3ba08518e18bea3e3103", 0x7f, 0x8}, {&(0x7f00000006c0)="6c4a49b777a8edde7e3cac806768141bc7f0704c1fe8dee1aac57d3006da5255d229fa2ed9e9a4cc778df82a252fdec26aebf9306a93481c9fa5bd3b70d980724b4d", 0x42, 0xfffffffffffffffe}], 0x40800, &(0x7f00000007c0)='bpf\x00') syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB="01800000000000007376312c00"]) 03:52:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x2000000) 03:52:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x4c, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1416.486778] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1416.520236] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1416.527446] EXT4-fs (sda1): Remounting filesystem read-only 03:52:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ffe6"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100013, &(0x7f0000000100)) 03:52:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x600) 03:52:45 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1600000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = open(&(0x7f0000000100)='./file0\x00', 0x80800, 0xc0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4004000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x138, r1, 0x121, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x29a0}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x10}}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x401}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8da6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x170000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4007}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x4004000}, 0x10) 03:52:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x4) 03:52:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10000a, &(0x7f0000000100)) [ 1416.903853] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xf5ffffff00000000) [ 1416.993953] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:45 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfc000000]}], 0x10) 03:52:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) removexattr(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)=@random={'trusted.', 'md5sum\x00'}) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x2, 0x103880) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) 03:52:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x3f00) 03:52:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108007, &(0x7f0000000100)) [ 1417.390220] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1417.401104] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1417.503223] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000540)="c4c140161666b833000f00d80fc79d04000000440f20c03505000000440f22c00f01c9c4e27913ccb9800000c00f3235000400000f3066b86e000f00d066b8e4008ee80fc7ab42430000", 0x4a}], 0x1, 0x0, &(0x7f0000000280), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000026000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000001c0)="64650f01d10f21c13e0fc71ee4e564260533092e0f083e3636650f1811650f01cf0f20d86635200000000f22d80f0138baf80c66b8d0ffdb8566efbafc0c66b80900000066ef", 0x46}], 0x1, 0x0, &(0x7f0000000300)=[@cr4={0x1, 0x40220}], 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000000800)=""/4096) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r4, 0x227f, &(0x7f0000000040)) 03:52:46 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6800000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x1c000000) 03:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c00a, &(0x7f0000000100)) 03:52:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:ssh_agent_exec_t:s0\x00', 0x26, 0x2) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="6a71666d220ce6d573c7fffffff7"]) 03:52:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xe000000000000000) 03:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104003, &(0x7f0000000100)) 03:52:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xf0ffff) [ 1417.926131] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:46 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfcff]}], 0x10) 03:52:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xfffffffffffff000) 03:52:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x4c8, 0x2a0, 0x0, 0x160, 0x3e0, 0x3e0, 0x3e0, 0x4, &(0x7f0000000240), {[{{@arp={@rand_addr, @local, 0x0, 0xff000000, @mac, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1\x00', 'ifb0\x00'}, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "aadf35a4b7ee2a382064bf038c3caa90312aea0ffb406e693906cee2fd8e75c1b595cd88f3da8813460610185e6837e06c50375dbb256e0c92a51ce1d7d548b5"}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2}}}, {{@arp={@loopback, @remote, 0x0, 0x0, @mac=@link_local, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6gretap0\x00', 'tunl0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback, @local}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x518) 03:52:46 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x20000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10000e, &(0x7f0000000100)) 03:52:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x100000000000000) [ 1418.253909] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1418.285190] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10800d, &(0x7f0000000100)) 03:52:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x4000000000000000) [ 1418.344146] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/../file0\x00', 0x109200, 0x120) readlinkat(r0, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000680)=""/254, 0xfe) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x2c4000, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000400)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00') syz_mount_image$ext4(&(0x7f0000000040)="69fc20d5b7", &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="7a6d266703f7bd2d74c1498f24fc83d639e9fc80c337cd10aaf1c4a6c7371fc8113176c0b1d32f7e9ef6a18e2814b8c52f4684306c7e8c88c415bda8738298aa2637de27be91d82abc8f73ebd5c5f9a3aed85c16137ff5e5e3f008822f7fe6edd03c5403616e20aeb024bb50d819d28121ae5755053f736e2e141313b971027503", 0x81, 0x4000009}, {&(0x7f00000005c0)="125e822e26cf0ef46b9e56bd893fced0c6a50f290710229c4069c4f5667e8c07e580701877f4418570fef38da43e77e700606502ee258676b35292ef612fb130974f098d0a3c5e37d21ef90ec25cd080654b88d5e55f4b7fc343065ad7a1b7e37bba366bcca275de31e0da34090e24aba417f1da7203baa299dd63fb00000000000000000000000000000000000000000000", 0x92, 0x7}, {&(0x7f0000000100)="f183dcfe240d199054b301c3fdaac66c9c943da93d72023bc19458a0ae", 0xfffffffffffffd46, 0x9}, {&(0x7f0000000480)="bb00d51d907ed5673410faaa3c74de79f4febfe50dfd97ce3bdb4d16e8cbcfbae66e3717d16030c5e694a273d82788225ef8b25e16d9c6fe83ccc6b14633566f28f7b43b48fdd1a0ff580a17ccbba06288109c07ca3a2ec690a4832cc86d26fad9196e80f837df493284ec450552b097a443dfe2972a495c46f5fe02e9f5a7ee9ebdd687c6896592aebd3350e852000000000000", 0x94, 0x3}], 0x100020, &(0x7f0000000240)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:52:47 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1a0, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xfffff000) [ 1418.604214] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1418.731116] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:47 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xfe80]}], 0x10) 03:52:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c00f, &(0x7f0000000100)) 03:52:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x40000) 03:52:47 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x900, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:47 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x300]}], 0x10) 03:52:47 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000040)={0x8, @random="0980f8d7170b"}) sendto$inet6(r0, &(0x7f0000000080)="14fad1a67a2427f8e24746448a0c91db6fefa6d807d31dec196fbb62792914998ab891665c2bbe7564e14eadbc758774354a9da6e0c6eaaad5fc994e58e0351101562bca6a25658d3aec2f88d0b4241316fcaf182817c230d290f53dd5689a250b94b97dcc27bb86a9fab6e42550", 0x6e, 0x20008000, &(0x7f0000000100)={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x19}, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="e1eb6768352401f75c81ad05e8581c6471cf0fb24b6878002f7a3f462a829f626915e3c3472c198563143fd298d92cc2d957476ad87c307c56423ab5ae95d4b8c86cf866b2c32825915f47c779352f3148bc3d771c50cd0f70eaf597e85ff6088bf9a9b4cc7e2db271b88b34a1dcb3476474ac480c621f584282036d9a80cf42acfb009ee632de460d67f9ff6d7c40641f189756e49adc6d28d37e98b5293497070c0c4cad1d68a2e4be8b07aacd6cc75a8c1dad232171d054a0ba93188ac21c847c6600ebb35496666b466c6cd710dd530b2ea330f495df8066e1", 0xdb, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x18}, 0x51e}, 0x1c) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e24, 0x41, @dev={0xfe, 0x80, [], 0x12}}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)="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", 0xfb, 0x0, &(0x7f00000003c0)={0xa, 0x4e20, 0x8}, 0x1c) getsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000400), &(0x7f0000000440)=0x4) syz_mount_image$nfs4(&(0x7f0000000480)='nfs4\x00', &(0x7f00000004c0)='./file0\x00', 0x9, 0x6, &(0x7f0000000900)=[{&(0x7f0000000500)="6ee9f2d40e57819e195ec0b76c509029f2efa45af4aa762b5cdd0a4fc66d7fc868f20e404771f3d695feb6b3cc9f6f7970", 0x31, 0x3}, {&(0x7f0000000540)="7721d7dfee4d4d7f0cfaa3db01ddd926e7c10a4af50b274b9b51db3e66d6eba9bf507a68ca8c36b8b9b81cdd6c0a9696582518b518080ae7983f23356794a6e49af96f86054c3d47c3722bb88baffba579d26a", 0x53, 0x3ff}, {&(0x7f00000005c0)="1405a9e023bbcd4d6bd4c76a84d7cb4660c35f85e318467df7a3d49b47eb7459ebdf152cee1fa1cfa8bab14118946ac8a41d28ed7b1c7d305d0d6966ab306c984e88b46146c948cfeb3cf4effb2aab9726f82bc3d9daf6accf3a4c0e66f972ec4c3768f920d6994879b1d39bf3dc5d6cd07de12267141f29030f189ce8c737cf5278baafdeab184c203e73d0f2ba720f33f9d183d7255fcc6322319c716da9bc3cfb7abe6dcfccad95343218cc1447db112490618e6da4339aac41ca2c8de9f576556381452b025c3c149c3b0e0ade1d7f6d31d1578e6ae2ff39d8c4552befdb86da27941c91", 0xe6, 0x100}, {&(0x7f00000006c0)="12dc8ef1435866a8ea3bab2c7511472c9dba35654058808dc12df89dce1fda43cb1ffa9cd4c92d3f9209ee5f4d3ea6065ec0a54e742cae3bb79f7f450a3383a85433514c5c2a", 0x46}, {&(0x7f0000000740)="085c73d0b8e777a116ad5be6cbea47fc159544d35cfbcd2a212c3b1d29d980679a29f3191210ffd5e1835301cb424c9f7bb3d805545bbde5b630f24c4fed5da0aa2f63cc719b882d4bf7b79a7adef82c8404aebf98ff69ec914350e8d43829c0287eb2c709023cccf91d13ec2230fbc1dfd6f90964ee93a8daf8737995e8d532db2fb208c8eb321308bec095a274deafb31f61f74df7f47de006e26eaccc3e8f2ab364d2c8f6998eaf62dd31507f0240b6646b374d7ab1bd93d2447e11698a4a6cd11c31c6cae1686430459738882a3870b4232e7b935b4d0162ca83cc", 0xdd, 0x7}, {&(0x7f0000000840)="a20ba35c2543960a1f40a719065a847269573ba69a456454bfaa66de4a56b910e9da36e75699419f04a95a8d503315ff7fb48df17480629ebc01f750d1707b59d905dbf1e6ee79a7f2f043053f656f54dc7195e2ed28014aa59fdd948af00cc4e56a87ab0557ff9b06012f753415f808ea99880449c82714a8e344a45df19dfc484d60b0b6d9123c24c82725ead415d8c035c515a7efc9e3276e3e61bb52c34541cce8b47e7441ec2a", 0xa9, 0x3}], 0x100000, &(0x7f00000009c0)='vmnet1\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/full\x00', 0x40000, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000a40)='syz1\x00') getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000a80)={@local, 0x0}, &(0x7f0000000ac0)=0x14) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000b00)={{0x2, 0x4e21, @multicast2}, {0x306}, 0x2, {0x2, 0x4e21, @local}, 'nr0\x00'}) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000b80)={0x2a, 0x9, 0x101, 0x6, 0x5, 0x1ff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000bc0)={'bpq0\x00', r2}) fcntl$getownex(r1, 0x10, &(0x7f0000000c00)={0x0, 0x0}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) fcntl$getown(r0, 0x9) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000c40)=0x1f8) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000c80)={0x1, 0x9, 0x5}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000cc0)={'security\x00'}, &(0x7f0000000d40)=0x54) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000d80)={0x1}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000dc0)) write$eventfd(r1, &(0x7f0000000e80), 0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000ec0)={'icmp\x00'}, &(0x7f0000000f00)=0x1e) renameat2(r1, &(0x7f0000000f40)='./file0\x00', r1, &(0x7f0000000f80)='./file0\x00', 0x3) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/rtc0\x00', 0x100, 0x0) ioctl$FICLONE(r4, 0x40049409, r0) 03:52:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x9000000) 03:52:47 executing program 0: r0 = socket$inet6(0xa, 0x805, 0x0) r1 = gettid() r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x1, 0x200) write$FUSE_WRITE(r2, &(0x7f0000000180)={0x18, 0x0, 0x3, {0x1}}, 0x18) sched_rr_get_interval(r1, &(0x7f0000000100)) setsockopt$inet6_buf(r0, 0x29, 0x25, &(0x7f0000000240)="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", 0x12b) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000200)={r4, 0x411b}, 0x8) sendto$inet6(r0, &(0x7f00000000c0)='E', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) 03:52:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c001, &(0x7f0000000100)) [ 1419.184884] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1419.198445] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000080)) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") close(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) listen(r2, 0x6) connect$inet(r3, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) close(r3) close(r0) 03:52:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x6) 03:52:47 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1419.454837] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user 03:52:48 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x6]}], 0x10) 03:52:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2711, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x23e) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) lseek(r0, 0x0, 0x4) 03:52:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104004, &(0x7f0000000100)) 03:52:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$void(0x35) 03:52:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x34000) 03:52:48 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:48 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000005c0)={0x3, "010000009e67e3187f2300f07d7338c60aa9c91f2a2bf971d1511cde771d374ce288f976"}, 0x2c, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/35}, 0x2b, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) socket$nl_crypto(0x10, 0x3, 0x15) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0xa6, 0x0, 0x1, 0x8, 0x0, 0x7, 0x4002, 0x2, 0x2, 0x4, 0x1f, 0x80000000, 0x7, 0x4, 0x20, 0x401, 0xbff, 0x3f, 0xfff, 0x400, 0x8001, 0x80, 0x0, 0x29, 0x10000, 0x4, 0x8, 0x429f, 0x401, 0x8, 0x80000000, 0x6, 0x4f8f60b3, 0x101, 0xe1b1, 0x5, 0x0, 0xfffffffffffffff9, 0x7, @perf_bp={&(0x7f0000000040), 0x5}, 0x4000, 0x8001, 0x30b, 0x1, 0x3, 0x0, 0x40}, r1, 0x5, r2, 0x1) 03:52:48 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f00000000c0)="0f0f1ba00873850f01d1ba4000b8a989ef660f2ac3ba4000b85700eff3cfbad00466b8b200000066ef3e0f38003abaf80c66b8a206ef8766efbafc0cec", 0x3d}], 0x1, 0x0, &(0x7f0000000200), 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x201, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 03:52:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x4000) [ 1420.095970] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:52:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104017, &(0x7f0000000100)) 03:52:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x100000, 0x3c, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5dc]}, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x80000) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x39b0) [ 1420.176710] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1420.192784] EXT4-fs: 14 callbacks suppressed [ 1420.192794] EXT4-fs (sda1): Remounting filesystem read-only 03:52:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) ioprio_get$uid(0x3, r1) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x3, &(0x7f0000000080), &(0x7f0000000000)=0x6b5c67d3) 03:52:49 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xac14141700000000]}], 0x10) 03:52:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x3000000) 03:52:49 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xfffffffffffffffd, 0x80000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="7e030096f452c7b5a1000000"]) r2 = memfd_create(&(0x7f0000000080)='/dev/sg#\x00', 0x2) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x100001, 0x6000, 0x5000, 0x100000], 0x2, 0x40, 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 03:52:49 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x74000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108009, &(0x7f0000000100)) 03:52:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x1c00000000000000) 03:52:49 executing program 0: io_setup(0x203, &(0x7f0000000040)=0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x80200) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x19e) mq_unlink(&(0x7f0000000080)='/dev/sequencer2\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1c000, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:52:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100003, &(0x7f0000000100)) [ 1421.014573] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1421.068201] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1421.083982] EXT4-fs (sda1): Remounting filesystem read-only 03:52:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x10000000000000) 03:52:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xfe80000000000000) [ 1422.906760] IPVS: ftp: loaded support on port[0] = 21 [ 1423.639151] bridge0: port 1(bridge_slave_0) entered blocking state [ 1423.645903] bridge0: port 1(bridge_slave_0) entered disabled state [ 1423.653782] device bridge_slave_0 entered promiscuous mode [ 1423.697773] bridge0: port 2(bridge_slave_1) entered blocking state [ 1423.704775] bridge0: port 2(bridge_slave_1) entered disabled state [ 1423.712374] device bridge_slave_1 entered promiscuous mode [ 1423.757235] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1423.802610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1423.937585] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1423.984887] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1424.199903] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1424.207763] team0: Port device team_slave_0 added [ 1424.252358] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1424.259780] team0: Port device team_slave_1 added [ 1424.303479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1424.351137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1424.400051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1424.445955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1424.453472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1424.470274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1424.928256] bridge0: port 2(bridge_slave_1) entered blocking state [ 1424.934712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1424.941381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1424.947810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1424.955556] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1425.422644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1426.664487] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1426.825881] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1426.986001] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1426.992398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1427.008434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1427.162566] 8021q: adding VLAN 0 to HW filter on device team0 03:52:56 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x600000000000000) 03:52:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000100)=0x30) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) 03:52:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c017, &(0x7f0000000100)) 03:52:56 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x805) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)={0x2, 0x0, [0x0, 0x0]}) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[], 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000100)) 03:52:56 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0xa000000]}], 0x10) 03:52:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x4000000000000) [ 1428.211812] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:52:56 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000200)={0xfff}, 0xfe98) listen(r0, 0x7) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x1}, [], {0x4, 0x3}, [{0x8, 0x1, r2}, {0x8, 0x3, r3}, {0x8, 0x4, r4}], {0x10, 0x5}, {0x20, 0x1}}, 0x3c, 0x0) r5 = accept4(r0, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000240)={0xa3, 0x0, 0x0, 0x0, 0x3c5, 0x0, 0x800010000, 0x5, 0x0, 0x1}, 0xb) clock_gettime(0x4, &(0x7f0000000380)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000004300)=[{{&(0x7f00000002c0)=@in, 0x80, &(0x7f00000027c0), 0x1, &(0x7f0000000080)=""/210, 0xfffffd94}}], 0x684, 0x0, &(0x7f0000004480)={0x0, r6+30000000}) r7 = semget$private(0x0, 0x3, 0x40) semctl$SETVAL(r7, 0x2, 0x10, &(0x7f0000000600)=0x7fffffff) 03:52:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x108005, &(0x7f0000000100)) [ 1428.293821] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1428.308449] EXT4-fs (sda1): Remounting filesystem read-only 03:52:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x2000000000000000) 03:52:57 executing program 2: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x2e) r2 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0xffffffffffffffb9, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x2000006, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x71, 0x12, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", &(0x7f0000001800)=""/18, 0x82}, 0x28) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0x5f1) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 03:52:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x500000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x8000a0ffffffff) 03:52:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x100002, &(0x7f0000000100)) 03:52:57 executing program 2: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x2e) r2 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0xffffffffffffffb9, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x2000006, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x71, 0x12, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", &(0x7f0000001800)=""/18, 0x82}, 0x28) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0x5f1) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) [ 1428.678375] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1428.695538] EXT4-fs (sda1): Remounting filesystem read-only 03:52:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x400300) 03:52:57 executing program 0: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000540ff0)=@req={0x3fc}, 0x10) clock_nanosleep(0x5, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000280)=@req3={0xfffffffffffffffd}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x3, 0x1, 0x6}, 0x10) 03:52:57 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x500]}], 0x10) 03:52:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x100000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x104000, &(0x7f0000000100)) 03:52:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x10) 03:52:57 executing program 2: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x2e) r2 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0xffffffffffffffb9, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x2000006, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x71, 0x12, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", &(0x7f0000001800)=""/18, 0x82}, 0x28) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0x5f1) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 03:52:57 executing program 0: r0 = syz_open_dev$video(&(0x7f00000006c0)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) write(r0, &(0x7f0000000000)="a07d79659eb83412540a3d4a2eed", 0xe) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x2) close(r0) 03:52:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xfffffdef) [ 1429.089956] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 03:52:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10c01d, &(0x7f0000000100)) [ 1429.134060] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1429.149686] EXT4-fs (sda1): Remounting filesystem read-only 03:52:57 executing program 2: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x2e) r2 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0xffffffffffffffb9, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x2000006, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x71, 0x12, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", &(0x7f0000001800)=""/18, 0x82}, 0x28) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0x5f1) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 03:52:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0xeffdffff) 03:52:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x6, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) 03:52:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x1c00) [ 1429.416782] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1429.425861] EXT4-fs (sda1): Remounting filesystem read-only 03:52:58 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local, [0x0, 0x3fa, 0x0, 0x0, 0x4000]}], 0x10) 03:52:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a, @empty=0x700000000000000}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x40030000000000) 03:52:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x10000b, &(0x7f0000000100)) 03:52:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r4, 0xfff}}, 0x10) 03:52:58 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='systemtu:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x2001001, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)="690121d5be", &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x10000000000000, &(0x7f0000000940), 0x100020, &(0x7f0000000040)={[{@max_batch_time={'max_batch_time'}}]}) [ 1429.966403] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1430.043536] EXT4-fs error (device sda1): ext4_remount:5216: Abort forced by user [ 1430.061152] EXT4-fs (sda1): Remounting filesystem read-only [ 1578.941689] INFO: task syz-executor0:12469 blocked for more than 140 seconds. [ 1578.949023] Not tainted 4.19.0-next-20181101+ #103 [ 1578.955773] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1578.963999] syz-executor0 D21208 12469 11524 0x00000004 [ 1578.969641] Call Trace: [ 1578.977840] __schedule+0x8cf/0x21d0 [ 1578.981847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1578.987398] ? __sched_text_start+0x8/0x8 [ 1578.991947] ? finish_task_switch+0x1b4/0x920 [ 1578.996465] ? preempt_notifier_register+0x200/0x200 [ 1579.001884] ? __switch_to_asm+0x34/0x70 [ 1579.005951] ? __switch_to_asm+0x34/0x70 [ 1579.010013] ? __switch_to_asm+0x40/0x70 [ 1579.014381] ? __switch_to_asm+0x34/0x70 [ 1579.018452] ? __switch_to_asm+0x40/0x70 [ 1579.022823] ? __switch_to_asm+0x34/0x70 [ 1579.026889] ? __switch_to_asm+0x40/0x70 [ 1579.030948] ? __switch_to_asm+0x34/0x70 [ 1579.035322] ? __switch_to_asm+0x34/0x70 [ 1579.039392] ? __switch_to_asm+0x40/0x70 [ 1579.043744] ? __switch_to_asm+0x34/0x70 [ 1579.047807] ? __switch_to_asm+0x40/0x70 [ 1579.052142] ? __switch_to_asm+0x34/0x70 [ 1579.056215] ? __switch_to_asm+0x40/0x70 [ 1579.060286] ? __schedule+0x8d7/0x21d0 [ 1579.064500] schedule+0xfe/0x460 [ 1579.067879] ? __schedule+0x21d0/0x21d0 [ 1579.072141] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1579.077085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1579.083011] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1579.088486] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1579.093713] schedule_timeout+0x1cc/0x260 [ 1579.097872] ? preempt_schedule+0x4d/0x60 [ 1579.102323] ? usleep_range+0x1a0/0x1a0 [ 1579.106324] ? preempt_schedule_common+0x1f/0xe0 [ 1579.111084] ? preempt_schedule+0x4d/0x60 [ 1579.115546] ? ___preempt_schedule+0x16/0x18 [ 1579.119967] wait_for_completion+0x427/0x8a0 [ 1579.124669] ? wait_for_completion_interruptible+0x840/0x840 [ 1579.130490] ? wake_up_q+0x100/0x100 [ 1579.134522] ? lock_release+0xa10/0xa10 [ 1579.138506] ? __init_waitqueue_head+0x9e/0x150 [ 1579.143477] ? init_wait_entry+0x1c0/0x1c0 [ 1579.147729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1579.153605] flush_workqueue+0x742/0x1e10 [ 1579.157765] ? mark_held_locks+0x130/0x130 [ 1579.162312] ? cancel_delayed_work+0x3e0/0x3e0 [ 1579.166905] ? check_preemption_disabled+0x48/0x280 [ 1579.172221] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1579.177156] ? kasan_check_read+0x11/0x20 [ 1579.181316] ? zap_class+0x640/0x640 [ 1579.185351] ? __lock_acquire+0x62f/0x4c20 [ 1579.189592] ? rcu_softirq_qs+0x20/0x20 [ 1579.193867] ? unwind_dump+0x190/0x190 [ 1579.197764] ? zap_class+0x640/0x640 [ 1579.201761] ? zap_class+0x640/0x640 [ 1579.205493] ? lock_acquire+0x1ed/0x520 [ 1579.209487] ? vb2_core_queue_release+0x30/0x80 [ 1579.215478] ? lock_release+0xa10/0xa10 [ 1579.219465] ? perf_trace_sched_process_exec+0x860/0x860 [ 1579.225246] ? mark_held_locks+0xc7/0x130 [ 1579.229415] ? zap_class+0x640/0x640 [ 1579.233440] ? __mutex_lock+0x85e/0x16f0 [ 1579.237510] ? trace_hardirqs_off_caller+0x300/0x300 [ 1579.242905] ? vb2_core_queue_release+0x30/0x80 [ 1579.247603] ? vb2_core_queue_release+0x6a/0x80 [ 1579.252642] vim2m_stop_streaming+0x7c/0x2c0 [ 1579.257061] ? vim2m_stop_streaming+0x7c/0x2c0 [ 1579.261954] ? vim2m_buf_queue+0xa0/0xa0 [ 1579.266025] __vb2_queue_cancel+0x171/0xd20 [ 1579.270360] ? vb2_buffer_done+0xb80/0xb80 [ 1579.274920] ? wait_for_completion+0x8a0/0x8a0 [ 1579.279517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1579.285383] ? __vb2_queue_free+0x753/0xa30 [ 1579.289727] ? v4l2_m2m_job_finish+0x4c0/0x4c0 [ 1579.294618] ? __vb2_plane_dmabuf_put.isra.5+0x310/0x310 [ 1579.300085] ? vidioc_querycap+0xd0/0xd0 [ 1579.304447] vb2_core_queue_release+0x26/0x80 [ 1579.308950] vb2_queue_release+0x15/0x20 [ 1579.313406] v4l2_m2m_ctx_release+0x2a/0x35 [ 1579.317739] vim2m_release+0xe6/0x150 [ 1579.321990] v4l2_release+0x224/0x3a0 [ 1579.325805] __fput+0x3bc/0xa70 [ 1579.329090] ? dev_debug_store+0x140/0x140 [ 1579.333667] ? get_max_files+0x20/0x20 [ 1579.337565] ? trace_hardirqs_on+0xbd/0x310 [ 1579.343077] ? kasan_check_read+0x11/0x20 [ 1579.347325] ? task_work_run+0x1af/0x2a0 [ 1579.351408] ? trace_hardirqs_off_caller+0x300/0x300 [ 1579.356858] ? filp_close+0x1cd/0x250 [ 1579.360754] ____fput+0x15/0x20 [ 1579.364347] task_work_run+0x1e8/0x2a0 [ 1579.368254] ? task_work_cancel+0x240/0x240 [ 1579.372872] ? copy_fd_bitmaps+0x210/0x210 [ 1579.377114] ? do_syscall_64+0x9a/0x820 [ 1579.381098] exit_to_usermode_loop+0x318/0x380 [ 1579.386001] ? __bpf_trace_sys_exit+0x30/0x30 [ 1579.390511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1579.396369] do_syscall_64+0x6be/0x820 [ 1579.400277] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1579.405932] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1579.410867] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1579.415995] ? trace_hardirqs_on_caller+0x310/0x310 [ 1579.421816] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1579.426841] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1579.432165] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1579.437027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1579.442604] RIP: 0033:0x457569 [ 1579.445811] Code: Bad RIP value. [ 1579.449175] RSP: 002b:00007fac56403c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1579.457346] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000457569 [ 1579.464924] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1579.473395] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1579.480711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fac564046d4 [ 1579.488329] R13: 00000000004efe32 R14: 00000000004cc6e0 R15: 00000000ffffffff [ 1579.495896] [ 1579.495896] Showing all locks held in the system: [ 1579.502615] 1 lock held by khungtaskd/1009: [ 1579.506933] #0: 00000000e84c6b38 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 1579.515871] 1 lock held by udevd/3501: [ 1579.519763] 1 lock held by rsyslogd/5533: [ 1579.524221] #0: 000000006dc20f7b (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 1579.532514] 2 locks held by getty/5623: [ 1579.536487] #0: 0000000031a1a60d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1579.545039] #1: 0000000015d4fdea (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1579.554325] 2 locks held by getty/5624: [ 1579.558296] #0: 000000004fa09fe3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1579.567026] #1: 00000000e2ec2afa (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1579.576207] 2 locks held by getty/5625: [ 1579.580176] #0: 000000000b6bdc9d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1579.589455] #1: 000000000ad48c56 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1579.598644] 2 locks held by getty/5626: [ 1579.603778] #0: 000000007720a28b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1579.612333] #1: 0000000090a35a2c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1579.621210] 2 locks held by getty/5627: [ 1579.625514] #0: 00000000c511ad6c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1579.634046] #1: 00000000beb7d44a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1579.643206] 2 locks held by getty/5628: [ 1579.647181] #0: 000000009dbb3d36 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1579.655750] #1: 00000000de06e26d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1579.664936] 2 locks held by getty/5629: [ 1579.668905] #0: 00000000ccb92b09 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1579.677468] #1: 00000000191edc69 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1579.686629] 2 locks held by kworker/0:4/7412: [ 1579.691119] #0: 00000000062cd1fa ((wq_completion)"events"){+.+.}, at: process_one_work+0xb43/0x1c40 [ 1579.700720] #1: 000000003fe6abd7 ((work_completion)(&smc->tcp_listen_work)){+.+.}, at: process_one_work+0xb9a/0x1c40 [ 1579.712487] 2 locks held by syz-executor0/12469: [ 1579.717247] #0: 00000000e32d2d8c (&mdev->req_queue_mutex){+.+.}, at: v4l2_release+0x1d7/0x3a0 [ 1579.726344] #1: 0000000023d4a01f (&dev->dev_mutex){+.+.}, at: vim2m_release+0xbc/0x150 [ 1579.736617] [ 1579.739129] ============================================= [ 1579.739129] [ 1579.746608] NMI backtrace for cpu 1 [ 1579.750245] CPU: 1 PID: 1009 Comm: khungtaskd Not tainted 4.19.0-next-20181101+ #103 [ 1579.758132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1579.767481] Call Trace: [ 1579.770074] dump_stack+0x244/0x39d [ 1579.773706] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1579.778901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1579.784449] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 1579.789210] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 1579.794403] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 1579.799686] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1579.804881] watchdog+0xb4c/0x1060 [ 1579.808435] ? hungtask_pm_notify+0xb0/0xb0 [ 1579.812764] ? __kthread_parkme+0xce/0x1a0 [ 1579.817003] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1579.822106] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1579.827218] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1579.831810] ? trace_hardirqs_on+0xbd/0x310 [ 1579.836136] ? kasan_check_read+0x11/0x20 [ 1579.840289] ? __kthread_parkme+0xce/0x1a0 [ 1579.844525] ? trace_hardirqs_off_caller+0x300/0x300 [ 1579.849632] ? trace_hardirqs_off_caller+0x300/0x300 [ 1579.854738] ? lockdep_init_map+0x9/0x10 [ 1579.858810] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1579.863916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1579.869477] ? __kthread_parkme+0xfb/0x1a0 [ 1579.873717] ? hungtask_pm_notify+0xb0/0xb0 [ 1579.878042] kthread+0x35a/0x440 [ 1579.881412] ? kthread_stop+0x8f0/0x8f0 [ 1579.885393] ret_from_fork+0x3a/0x50 [ 1579.889249] Sending NMI from CPU 1 to CPUs 0: [ 1579.895062] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.004 msecs [ 1579.895790] NMI backtrace for cpu 0 [ 1579.895797] CPU: 0 PID: 3501 Comm: udevd Not tainted 4.19.0-next-20181101+ #103 [ 1579.895804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1579.895809] RIP: 0010:__lock_acquire+0xc9/0x4c20 [ 1579.895821] Code: c7 40 24 f2 f2 f2 f2 c7 40 28 04 f2 f2 f2 c7 40 2c f2 f2 f2 f2 c7 40 30 00 f2 f2 f2 c7 40 34 f2 f2 f2 f2 c7 40 38 00 f2 f2 f2 40 3c f2 f2 f2 f2 c7 40 40 00 f2 f2 f2 c7 40 44 f2 f2 f2 f2 c7 [ 1579.895826] RSP: 0018:ffff8801c7387190 EFLAGS: 00000082 [ 1579.895834] RAX: ffffed0038e70e46 RBX: 1ffff10038e70eae RCX: 0000000000000000 [ 1579.895840] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffff8801c6a42b18 [ 1579.895846] RBP: ffff8801c7387518 R08: 0000000000000001 R09: 0000000000000001 [ 1579.895852] R10: ffffed0038e6c6f7 R11: ffff8801c73637bf R12: ffff8801c7378580 [ 1579.895858] R13: ffff8801c6a42b18 R14: 0000000000000000 R15: 0000000000000000 [ 1579.895864] FS: 00007fa5bdbf37a0(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 1579.895869] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1579.895875] CR2: ffffffffff600400 CR3: 00000001c72bd000 CR4: 00000000001406f0 [ 1579.895881] DR0: 0000000000000000 DR1: 0000000020000000 DR2: 0000000020000000 [ 1579.895887] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000010602 [ 1579.895890] Call Trace: [ 1579.895894] ? ep_scan_ready_list+0xd2d/0x1050 [ 1579.895899] ? skb_copy_and_csum_datagram_msg+0x420/0x420 [ 1579.895903] ? sock_poll+0x33e/0x4a0 [ 1579.895907] ? sock_ioctl+0x690/0x690 [ 1579.895911] ? mark_held_locks+0x130/0x130 [ 1579.895915] ? sock_ioctl+0x690/0x690 [ 1579.895919] ? __lock_is_held+0xb5/0x140 [ 1579.895924] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1579.895929] ? ep_send_events_proc+0x88d/0xed0 [ 1579.895933] ? do_epoll_wait+0x200/0x200 [ 1579.895937] ? zap_class+0x640/0x640 [ 1579.895941] ? print_usage_bug+0xc0/0xc0 [ 1579.895945] ? find_held_lock+0x36/0x1c0 [ 1579.895949] lock_acquire+0x1ed/0x520 [ 1579.895953] ? ep_scan_ready_list+0x4cb/0x1050 [ 1579.895957] ? _raw_spin_unlock_irq+0x27/0x80 [ 1579.895961] ? lock_release+0xa10/0xa10 [ 1579.895965] ? trace_hardirqs_off+0xb8/0x310 [ 1579.895969] ? kasan_check_read+0x11/0x20 [ 1579.895974] ? ep_scan_ready_list+0x4cb/0x1050 [ 1579.895978] ? trace_hardirqs_on+0x310/0x310 [ 1579.895982] _raw_spin_lock_irq+0x61/0x80 [ 1579.895986] ? ep_scan_ready_list+0x4cb/0x1050 [ 1579.895991] ? do_epoll_wait+0x200/0x200 [ 1579.895995] ep_scan_ready_list+0x4cb/0x1050 [ 1579.895999] ? select_estimate_accuracy+0xde/0x4b0 [ 1579.896003] ? lock_downgrade+0x900/0x900 [ 1579.896007] ? ktime_get_ts64+0x3fe/0x4f0 [ 1579.896012] ? ep_poll_callback+0x10e0/0x10e0 [ 1579.896016] ? pvclock_read_flags+0x160/0x160 [ 1579.896020] ? select_estimate_accuracy+0xde/0x4b0 [ 1579.896024] ? zap_class+0x640/0x640 [ 1579.896028] ? kvm_clock_read+0x18/0x30 [ 1579.896033] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1579.896037] ? ktime_get_ts64+0x389/0x4f0 [ 1579.896041] ? find_held_lock+0x36/0x1c0 [ 1579.896046] ? ep_poll+0x4fa/0x13d0 [ 1579.896050] ? _raw_spin_unlock_irq+0x27/0x80 [ 1579.896054] ? _raw_spin_unlock_irq+0x27/0x80 [ 1579.896059] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1579.896063] ? trace_hardirqs_on+0xbd/0x310 [ 1579.896067] ? kasan_check_read+0x11/0x20 [ 1579.896071] ? ep_poll+0x4fa/0x13d0 [ 1579.896076] ? trace_hardirqs_off_caller+0x300/0x300 [ 1579.896079] ep_poll+0x572/0x13d0 [ 1579.896083] ? do_epoll_create+0x590/0x590 [ 1579.896088] ? preempt_notifier_register+0x200/0x200 [ 1579.896092] ? __switch_to_asm+0x34/0x70 [ 1579.896096] ? __switch_to_asm+0x34/0x70 [ 1579.896100] ? __switch_to_asm+0x40/0x70 [ 1579.896104] ? __switch_to_asm+0x34/0x70 [ 1579.896113] ? __switch_to_asm+0x40/0x70 [ 1579.896118] ? __switch_to_asm+0x34/0x70 [ 1579.896122] ? __switch_to_asm+0x40/0x70 [ 1579.896126] ? __switch_to_asm+0x34/0x70 [ 1579.896130] ? __switch_to_asm+0x34/0x70 [ 1579.896134] ? __switch_to_asm+0x40/0x70 [ 1579.896138] ? __switch_to_asm+0x34/0x70 [ 1579.896142] ? __switch_to_asm+0x40/0x70 [ 1579.896147] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1579.896151] ? __switch_to_asm+0x40/0x70 [ 1579.896155] ? __switch_to_asm+0x34/0x70 [ 1579.896159] ? __sched_text_start+0x8/0x8 [ 1579.896163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1579.896168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1579.896172] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1579.896176] ? retint_kernel+0x2d/0x2d [ 1579.896181] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1579.896185] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1579.896190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1579.896195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1579.896199] ? __fget_light+0x2e9/0x430 [ 1579.896203] ? fget_raw+0x20/0x20 [ 1579.896207] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1579.896211] ? schedule+0x108/0x460 [ 1579.896215] ? do_syscall_64+0x9a/0x820 [ 1579.896219] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1579.896223] do_epoll_wait+0x1b0/0x200 [ 1579.896228] __x64_sys_epoll_wait+0x97/0xf0 [ 1579.896232] do_syscall_64+0x1b9/0x820 [ 1579.896236] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1579.896241] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1579.896245] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1579.896250] ? trace_hardirqs_on_caller+0x310/0x310 [ 1579.896255] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1579.896259] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1579.896264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1579.896267] RIP: 0033:0x7fa5bd307943 [ 1579.896280] Code: 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 83 3d b5 dc 2a 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 3b c4 00 00 48 89 04 24 [ 1579.896284] RSP: 002b:00007ffd0f4810e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 1579.896295] RAX: ffffffffffffffda RBX: 0000000000000bb8 RCX: 00007fa5bd307943 [ 1579.896301] RDX: 0000000000000008 RSI: 00007ffd0f4811e0 RDI: 000000000000000a [ 1579.896306] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 1579.896312] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 1579.896318] R13: 0000000000000000 R14: 0000000000db8230 R15: 0000000000db2250 [ 1579.902546] Kernel panic - not syncing: hung_task: blocked tasks [ 1580.479230] CPU: 1 PID: 1009 Comm: khungtaskd Not tainted 4.19.0-next-20181101+ #103 [ 1580.487109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1580.496461] Call Trace: [ 1580.499062] dump_stack+0x244/0x39d [ 1580.502819] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1580.508082] panic+0x2ad/0x55c [ 1580.511283] ? add_taint.cold.5+0x16/0x16 [ 1580.515448] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1580.520903] ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a [ 1580.526356] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 1580.531812] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1580.537272] watchdog+0xb5d/0x1060 [ 1580.540835] ? hungtask_pm_notify+0xb0/0xb0 [ 1580.545161] ? __kthread_parkme+0xce/0x1a0 [ 1580.549400] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1580.554508] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1580.559612] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1580.564198] ? trace_hardirqs_on+0xbd/0x310 [ 1580.568519] ? kasan_check_read+0x11/0x20 [ 1580.572676] ? __kthread_parkme+0xce/0x1a0 [ 1580.576913] ? trace_hardirqs_off_caller+0x300/0x300 [ 1580.582018] ? trace_hardirqs_off_caller+0x300/0x300 [ 1580.587128] ? lockdep_init_map+0x9/0x10 [ 1580.591196] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1580.596310] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1580.601850] ? __kthread_parkme+0xfb/0x1a0 [ 1580.606093] ? hungtask_pm_notify+0xb0/0xb0 [ 1580.610414] kthread+0x35a/0x440 [ 1580.613787] ? kthread_stop+0x8f0/0x8f0 [ 1580.617766] ret_from_fork+0x3a/0x50 [ 1580.623011] Kernel Offset: disabled [ 1580.626654] Rebooting in 86400 seconds..