ive=1 [ 1053.593542] kauditd_printk_skb: 568 callbacks suppressed [ 1053.593552] audit: type=1400 audit(2000000029.940:48650): avc: denied { map } for pid=16440 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.621820] audit: type=1400 audit(2000000029.940:48651): avc: denied { map } for pid=16440 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.934229] audit: type=1400 audit(2000000030.280:48652): avc: denied { map } for pid=16441 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.957692] audit: type=1400 audit(2000000030.290:48653): avc: denied { map } for pid=16441 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.987193] audit: type=1400 audit(2000000030.330:48654): avc: denied { map } for pid=16443 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:50 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:33:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=0x6e, 0x800) r8 = eventfd2(0x2, 0xc00) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000600)="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", 0x200) sendfile(r9, r10, 0x0, 0x666d) sendfile(r9, r10, 0x0, 0xa195) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, r7, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2, 0x0, 0x0, r8}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, r9, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:33:50 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) sendfile(r0, r3, 0x0, 0x6674) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800600}, 0xc, &(0x7f0000000540)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a4010180dbf72d7f3e9854c83604c294eefcfd05870af809924adc5302da6164049665920051a9e32d0f1fc3400000000c0e346cce5f27894a5c56e000851996826f9d4c16391c1404df58004b6e", @ANYRES16=r5, @ANYBLOB="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"], 0x2a4}, 0x1, 0x0, 0x0, 0x888c0}, 0x40000) sendfile(r0, r1, 0x0, 0xa195) signalfd4(r1, &(0x7f0000000000)={0x1}, 0x8, 0xc0400) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r6, 0x0) r7 = add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)="baa2e64619586e35cdb1dadd47c7613bc0cac27e438b23513fa146fdc1d72c7d76dab5ba61a1d504830a15f104f56be9803f5278e162a2dcd7fd939032e6332db85e1cb77564da2f0f02635dde2f97697da589cbbe86de01d56c7a94d26fc73ba31a1795161e5eebf5b138d7fe4748bb834e2c623fa3745d12eff4755568efd7090c66fd93d04c69894b3d1b429845058074d42edc8824e4eeee592fcd76a3ef57f67d2c", 0xa4, r6) r8 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000600)="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", 0x200) sendfile(r9, r10, 0x0, 0x666d) sendfile(r9, r10, 0x0, 0xa195) fallocate(r9, 0x6, 0xffff, 0x9) r11 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r12 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x540202, 0x0) ioctl$sock_inet_SIOCGIFADDR(r12, 0x8915, &(0x7f0000000bc0)={'erspan0\x00', {0x2, 0x4e22, @broadcast}}) write(r8, &(0x7f0000000600)="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", 0x200) sendfile(r8, r11, 0x0, 0x666d) sendfile(r8, r11, 0x0, 0xa195) ioctl$sock_TIOCOUTQ(r8, 0x5411, &(0x7f0000000280)) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r7, 0x5f, 0xda}, &(0x7f0000000300)={'enc=', 'raw', ' hash=', {'wp512\x00'}}, &(0x7f0000000380)="542b58e9f9df857c0d851f7315f374c5eca29548c8a9e8b7d2e8d9f2158a9164d7b0dd4dd108ba3dbec9de3b09fcce6e01aafcb1b1dd8c940040f634ddec2e5efc16ac954ce1195c1f53f35501e6c662846a6cf394c87e50078575e0b173d3", &(0x7f0000000800)="86866ef1f3588c4c4b2dc589bd07680f2d9784959cb2108e738bad15c5d26334ef3b6e1e4a408c34250603397fea840263163cc435486a9f159d7dc9995fdb77b55ef5bf0adb3a175b7a5e3fa97b44c2b4bfcbfbe1ea5383225ff2a5cc7c0847b1d52f8d7ecebe026e321cf7b101dffd5cd7bbc8c0e53fb2fae68956f69accbae0749df5713297920aa5ac14ee0b22a16736e277e04d5bec4212fa0cefea9eb88ca7a2f606d5d54a62442efbeda835992734052209bf7ebbbb5c9b8a8bc4a6d7a243d26a6c6633bfeaafd01db46c326fa2f24636fe742c52479f") [ 1054.024667] audit: type=1400 audit(2000000030.360:48655): avc: denied { map } for pid=16443 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1054.047179] audit: type=1400 audit(2000000030.360:48656): avc: denied { map } for pid=16443 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:50 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000000080)=0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f00000001c0)=ANY=[@ANYBLOB="6465627567616e745f65787478303030303030303030303030303330002c00b6e4b76e3a03a1cfc7a82c569b7f03c981d608721bc0b432f7466d43f15b36cba32b98d3675d1837311d989a41ab58dae004f3e5c8eb8459ea1f6f669961cb7880cf3c6dc25becb914911e0a19eed6396450ce30d8dd6939d66947524a25fbaddacf788814b74c9662da7d6eb77ca8aeb0eb54f99d49897afcfe825bd2fde85f9a2709a622f6c42ba63b48e70cfa5137e1828403d772d38c8515ffae193a9ce5811168123f485bd8cc2740ba87aa910ab019b8c1ecc9092960a5606918982e916afad65294"]) 03:33:50 executing program 2: open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000005480)) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) 03:33:50 executing program 4: syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0xfffffffffffffe8c, 0x0, 0x0, 0x0, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x0, 0xe5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) unshare(0x20020000) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) pipe(&(0x7f0000000080)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x40, &(0x7f0000000340)=ANY=[]) r1 = open(&(0x7f0000000100)='./file0\x00', 0x200c2, 0x4) write$nbd(r1, &(0x7f0000000380)=ANY=[], 0x0) sendfile(r1, r1, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', 0x7c8d645823812c52, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) rmdir(0x0) [ 1054.072093] audit: type=1400 audit(2000000030.360:48657): avc: denied { map } for pid=16443 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1054.149258] audit: type=1400 audit(2000000030.360:48658): avc: denied { map } for pid=16443 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1054.163547] EXT4-fs (sda1): Unrecognized mount option "debugant_extx000000000000030" or missing value 03:33:50 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1054.261625] audit: type=1400 audit(2000000030.360:48659): avc: denied { map } for pid=16443 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:50 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0xdb40df60910c9b08) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) creat(&(0x7f0000000300)='./file0\x00', 0x2) sendfile(r1, r2, 0x0, 0x6669) sendfile(r1, r2, 0x0, 0xa195) fsetxattr(r2, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', 0xfffffffffffffffd, 0x0, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0xfd20, 0x0, &(0x7f00000000c0)=ANY=[], 0x227, 0x0, &(0x7f0000000200)="16484798efed88cf4ae8d0768251c812eb58ad0463bd0de3865a2d7f1046b0c85f6a13c56c8e01a2db348c994987c0646e7872816bb58e80f1c2aba9a3952ae2331c9eaa02dc08ff85fd9b3010c8af192684bf3550eb57d8df88039be282329835924f8f676256d1e9621f5b673ad2e84547aed8afbbc95a9422463e11b4c60c5c22a74f26d956bae1e9fd25f7f4731175deb18871f5d1fd0b597b00220f7e361c9fec56b1b9085e4aad24abd6d20c348cadf0df97388bfe4383759063d74a425a952ab6"}) pipe2(&(0x7f00000001c0), 0x4800) sendto$inet6(r4, &(0x7f00000000c0)="288621d98d17e8cee212a297827065115aa830da1edabb3c9df95367c7e0704fe9d415239d53a5b05215b48c65339ef232c1863faaf1bcca43a04f21f5963e26b4c5c410b1b0a51dbf25106ae56d18", 0x4f, 0x4000010, 0x0, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000340)=0x401) 03:33:50 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=""/4096, 0x1000) 03:33:50 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:33:50 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x4) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x8000000000086}) fstat(r0, &(0x7f0000000400)) fcntl$setstatus(r0, 0x4, 0x44800) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00?\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x0, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[]}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x108, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x180) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0xb2) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x3ff, 0xffffff80, 0xd0, 0x11, 0x3a, 0x0, 0x1, 0x25, 0x2, 0x9, 0x1000}) io_setup(0x200, &(0x7f0000000140)) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x8200}]) 03:33:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=0x6e, 0x800) r8 = eventfd2(0x2, 0xc00) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000600)="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", 0x200) sendfile(r9, r10, 0x0, 0x666d) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, r7, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2, 0x0, 0x0, r8}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, r9, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:33:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@broadcast, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0x2f0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) faccessat(r2, 0x0, 0x80200000003, 0x0) sendmsg$nl_route(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000400)=ANY=[@ANYBLOB="0000040010000000000000000000000000be931794142eb4ff0000007025f7f317f1000000000000d6f9d5e2aa4c61cff6219a7ebf10f6d733c2ef9696b12e85be00f68e24db905b2ca0c62cad3d79e4e98afc5da105aa26fa4dcb5b08abb0f200ca987a3429c0808ca151446e83d65d9fceec560a00"/141, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000280)={0x1, 0x70, 0x7f, 0x63, 0x0, 0x0, 0x0, 0x4, 0x400, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1c000, 0xde7ccd1e62f17411, @perf_config_ext={0x9, 0xa25b}, 0x8000, 0x400, 0x0, 0x8e48e73807cd43cf, 0x9, 0x4, 0x2}) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0xb9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22483, 0x0, 0x0, 0x5, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, 0x0, 0x24000058) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) read(0xffffffffffffffff, 0x0, 0x0) read(r5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x65, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r6) socket$inet(0x2, 0x4000000000000001, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00005befdc)) r8 = syz_open_pts(r7, 0x0) ioctl$TIOCCONS(r8, 0x541d) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) dup3(r8, r7, 0x0) 03:33:51 executing program 2: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) epoll_create1(0x1c0000) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r7 = socket(0x400000000000010, 0x802, 0x0) write(r7, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) write(r6, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2d, 'pids'}, {0x2b, 'rdma'}, {0x2d, 'pids'}]}, 0x12) [ 1054.900775] EXT4-fs (sda1): required extra inode space not available [ 1054.944222] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1055.030672] EXT4-fs (sda1): required extra inode space not available [ 1055.067779] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:33:51 executing program 2: 03:33:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) r4 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x666d) sendfile(r4, r5, 0x0, 0xa195) r6 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x14, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000380)={'veth0_to_hsr\x00', &(0x7f0000000300)=@ethtool_coalesce={0xe, 0x1000, 0x9, 0xfc, 0x5, 0x1, 0xfb, 0x6, 0x0, 0x6, 0x1, 0x2, 0xfff, 0x81, 0x9, 0x6, 0x7, 0x2, 0xffff, 0x0, 0x3, 0x7fff, 0x6}}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f00000000c0)=0x10000001b) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(r1, r7, r9) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB='dejug_want_extra_isize=0x0000000000000300,\x00']) 03:33:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=0x6e, 0x800) r8 = eventfd2(0x2, 0xc00) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000600)="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", 0x200) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, r7, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2, 0x0, 0x0, r8}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, r9, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:33:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x2) readv(r0, &(0x7f0000000680)=[{&(0x7f0000000300)=""/198, 0xc6}, {&(0x7f0000000400)=""/254, 0xfe}, {&(0x7f0000000040)=""/72, 0x48}, {&(0x7f0000000200)}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f0000000240)=""/54, 0x36}, {&(0x7f00000005c0)=""/46, 0x2e}, {&(0x7f0000000600)=""/128, 0x80}], 0x8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r2, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) setitimer(0x6, &(0x7f0000000280)={{0x77359400}, {0x0, 0x7530}}, &(0x7f00000002c0)) 03:33:51 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x16f, 0x1a0}]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={0x0, 0x4}, 0x300, 0x0, 0xfffffffd, 0x4, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$inet6(0xa, 0x2, 0x0) close(r2) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r3, 0x200006) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$P9_ROPEN(r3, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x10}, 0x401}}, 0x18) openat$cgroup(r1, 0x0, 0x200002, 0x0) getgid() r4 = memfd_create(&(0x7f0000000300)=':trusted!{\x00', 0x2) write$binfmt_misc(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="cc6f726c4dd5f6da5af4706ad3341e738239a81a73a9219d24df087ed9b236f2adbc14a7353386bc1dde7fa9a9bfd75bf8fb628b6c0aca7995f175aea9ab4fcdaac99ab91a83b971b68e75ac847e6a900cfa6f452029918530d0a52a61fb4c50982900"/110], 0x1) fcntl$addseals(r4, 0x409, 0x0) pwrite64(r4, 0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)=0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r5 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000280)=0x10) fcntl$notify(r5, 0x402, 0x1) 03:33:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=0x6e, 0x800) r8 = eventfd2(0x2, 0xc00) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, r7, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2, 0x0, 0x0, r8}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, r9, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:33:52 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) vmsplice(r0, &(0x7f0000000500)=[{&(0x7f0000000080)="07e9adffa4b2931e6f34f555c5d1355ab12e84e1ef05c2472212e88973d8274533a1fbf0e9d600f1fe868e0162db4bccf4a26a7ec68755114ce4b18cbcebbb0391ebb8af26170a280af841a9a02a35a37ab39f40ada164ff890a835e10a1a9c8d3bcaa68b15cca05945db9fe3e24eff12aab6875d576436d7b34a5b4c267373f8dad5b77b18e08a6fa8099dfcc37942f1442f1594f3d7eeb808b0d", 0x9b}, {&(0x7f0000000240)="345dad30fd617e180e167b7c57d49b361de2174c4fa326a68b6366ed2af750f8bea5ca339815291c03573a0a21cae51cde0095127b26d47a6ce71c0f452e7051216283d87e23787f6dc4ab05b198e6fc32a51a1a2d43c6ab363c64511930bb6d86dee7b0ebce28b0340ff24c6456c831b1b8437147c9966bb6d8b7b8a2d331f640e3dd549da41386a377492ba9b844da2ba94c970dfbb9446d28c56c755374d038487380db9851c13c5faddeac45eab8507e0b3ee6c7dd6ad71b9540b516ec0ec94608af5629ef10026d4d4e9ad008e26c203e2c146fdf", 0xd7}, {&(0x7f0000000340)="019b2567a1d1ff64ccd165c7d3e8d17d155c2d16405d561e313560edf633c8c0f37c981168213bc45c0b2ef4a1a13fc88170e99d83df322e1e94771b9436b06438932ee3035126dbf0c34eef2c05af1d4793914eea7ee42aa2f5c225f8c2c702fe077528829ae0b184a23d150af5505a4f550b59aaca17809555fa0e714eb2224261a17d2b4d18", 0x87}, {&(0x7f0000000400)="8e4f7c8ae087976a9f9d5cca77fcce10ec518ef2c06fe685afbba7ece8c5aa4ea62fc9ab18ff15b4ba0720b8ff42dc3e69c886a3f46a5d8b6b52c88b8ba158a8a1a163643537fb000260c836bc5609cb669ac72d6d1a77083609750d545768b93e8a7a7088474f8b957ae721697b748d90462fb157247f35d80da82f28a0c23a1cfe45e04bfb0d8f9d8842ec9ef40736502c4e28f91e61c7e8ea02fb60e80aeae58704015bd2b83526383b9dc4b577fb4cdc9505a0c8d205cefa3e2ca805eac9fd", 0xc1}], 0x4, 0x8) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66696c6557500330"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) fallocate(r1, 0x39, 0x8, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f00000001c0)=ANY=[@ANYBLOB="64656275675f77616e745f65787472615f6973697a653d3078303030303030303030303030303330302c0001654d870902f861152ae18f6dc6e64240a91047b075af5c0a9367aaf1c9d23b96ea74c2eb"]) [ 1056.708496] loop2: p1 < > p4 [ 1056.774193] loop2: p1 size 2 extends beyond EOD, truncated [ 1056.906627] loop2: p4 start 1854537728 is beyond EOD, truncated [ 1058.830800] kauditd_printk_skb: 227 callbacks suppressed [ 1058.830809] audit: type=1400 audit(2000000035.180:48887): avc: denied { map } for pid=16561 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.858771] audit: type=1400 audit(2000000035.180:48888): avc: denied { map } for pid=16561 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.881237] audit: type=1400 audit(2000000035.180:48889): avc: denied { map } for pid=16562 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.904078] audit: type=1400 audit(2000000035.180:48890): avc: denied { map } for pid=16562 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.928560] audit: type=1400 audit(2000000035.180:48891): avc: denied { map } for pid=16563 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.951669] audit: type=1400 audit(2000000035.180:48892): avc: denied { map } for pid=16563 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.974837] audit: type=1400 audit(2000000035.210:48893): avc: denied { map } for pid=16564 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.997176] audit: type=1400 audit(2000000035.210:48894): avc: denied { map } for pid=16564 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1059.019958] audit: type=1400 audit(2000000035.210:48895): avc: denied { map } for pid=16565 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1059.042314] audit: type=1400 audit(2000000035.210:48896): avc: denied { map } for pid=16565 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:58 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:33:58 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) lsetxattr$security_capability(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.capability\x00', &(0x7f00000005c0)=@v1={0x1000000, [{0x9, 0x1}]}, 0xc, 0x4) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x9772, 0x6, &(0x7f0000000400)=[{&(0x7f00000001c0)="5ed0e141090fe524f9d5e7b4403e46570487257fdcd0710d087541dd6a9b63fe7b0804a15bfd9315fbb467b8bc06a61d1430a6121dad471195a667df2adbbd20fb461692ccbeab20f79a9a69dea05b041b31e7b2a5c78ea97b4fdf06f74bac9a2e53bd92c69a4be40c8ab0c329b3fb964d9d", 0x72, 0x3}, {&(0x7f0000000240)="325894c569c1e274e12a246ca2386244f524bd403371c7c74de65fcecd6946ca3299da04774e4008ab6530fe07d577b6e14877d0fa1fa4ca5d4a5f6508c9ece3a68922df30c5fc2892a3f8fa813695df146400283d0875d4", 0x58, 0x8}, {&(0x7f0000000100)="ee92ea887bcc510cb1bdb60553731f63eee79bc450e81c43f67362cef37ac76eb95d3ea0e3aab36325546756180d52d8c65eeae02587abc4e8", 0x39, 0x1}, {&(0x7f00000002c0)="7514dcd2834b429f2dcb8aeb9ee0420a7beef53268ccb546b0988f6a12f5aaf0caeb46008e6bf12e8bb0849aa6fc0af0ee9a2f0c352d29deaac708200133ba0ca0611b59ef212be9dc0fd37053209ef9a75a10b2fbdebba62c6a73e76cdb0a8c492210ba6db006da3ed50eb85c308facee6fb9b52d9aeaec6a5c2ba753ece87fbe84b0d340dba581434ff769350040008cc354b5dd16cddf2aa2d1f4bc43f1fa93cb414cef2e4cdf0bf711e2a94ea8825f", 0xb1, 0x9}, {&(0x7f0000001380)="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", 0x1000, 0x1}, {&(0x7f0000000380)="8497c9b65a544a0d497c9e5a585314bc8cba3bf9be3c2787a6c7b2bcefbb5b629ef22ade8a6234f90392913cf790a92b4297eefde01cd9918ff63f10afa012b2f4116299464af1585cdd860ae1e8f8f39251dcecd5dc453594569c97a95550addbc29e419e134aa009b2930b0ff4931f42856b0bc602d365ccb29fc0", 0x7c, 0xffff}], 0x4200000, &(0x7f00000004c0)={[{@nobh='nobh'}, {@init_itable_val={'init_itable', 0x3d, 0x3bf}}, {@barrier_val={'barrier', 0x3d, 0x1}}, {@grpid='grpid'}, {@noblock_validity='noblock_validity'}, {@barrier='barrier'}, {@dioread_nolock='dioread_nolock'}], [{@dont_appraise='dont_appraise'}]}) 03:33:58 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="ff"], 0x1) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040)="498e3c5f64d879006e2ea3efd6d9178388b80040175caacc4f00f623ac837c3980e774e8513389d3d13b425764cf92dcdcba1ce95f9a98279b3b461b6e3e296350a30ee554aad1cb93f266e0182fbda66e99fd32bd656cae7552533ade742f8ab66efd26a09b5e2967172eaec88e4cbf5953466e3784be4a7469f66c875ec7f657488c6a8041212b921dfd5d2f84588358a7620e322ea9990455ad0891543be9881ffc", 0xa3}, 0x68) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0xc3) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) sendfile(r3, r3, 0x0, 0x7fff) 03:33:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=0x6e, 0x800) r8 = eventfd2(0x2, 0xc00) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, r7, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2, 0x0, 0x0, r8}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, r9, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:33:58 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) r2 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000100)=0x7, 0x27d) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 03:33:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="0c0100002d0010002bbd7000fcdbdf250000000000000000", @ANYRES32=r5, @ANYBLOB="0b000000f1ff0d000b000a0008000500010c0000080001006270660024000200080009000500000008000700000000002600090008000000080008000100000008000500c0f9000008000500091f00000800010066770000900002008c00040088001f0000001000010074756e85656c5f6b657900000c00020008000a00010000006400060091670c621e84fe6af29b2a2a027e70b5eb45e3acf9b5daaf4c8738230f46d94772991e2bb4c1fe3305876fdc628bfa25c07b81346499b3e2b3670bf2aa0729adfb7377212c6d780866f6ccf19a0acce38c6ab732f5ff0f40d674046791aa248c000008000b0003000000"], 0x10c}, 0x1, 0x0, 0x0, 0x200c0085}, 0xc000) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r6, 0x0, 0x666d) sendfile(r2, r6, 0x0, 0xa195) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000000)={{0x1, 0x2, 0x3, 0x2, 0x4}, 0x200, 0x4}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000140)="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"/297, 0x3accf8d5) ptrace(0x4206, r1) tkill(r1, 0x800000009) 03:33:58 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:33:58 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1062.155057] EXT4-fs (sda1): required extra inode space not available [ 1062.214934] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1062.338369] EXT4-fs (sda1): required extra inode space not available [ 1062.375488] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:33:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=0x6e, 0x800) r8 = eventfd2(0x2, 0xc00) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, r7, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2, 0x0, 0x0, r8}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:33:58 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1062.686131] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:33:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=0x6e, 0x800) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, r7, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1062.778198] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:33:59 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000005c0)=0xfffffffffffffe83) setuid(r2) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = dup2(r0, r5) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000580)) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r8 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r9 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r8, &(0x7f0000000600)="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", 0x200) sendfile(r8, r9, 0x0, 0x666d) sendfile(r8, r9, 0x0, 0xa195) r10 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r11 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r10, &(0x7f0000000600)="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", 0x200) sendfile(r10, r11, 0x0, 0x666d) sendfile(r10, r11, 0x0, 0xa195) r12 = fcntl$getown(r11, 0x9) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000000540)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb, 0x80000000}, 0xc, &(0x7f0000000440)=[{&(0x7f00000001c0)={0x274, 0x3a, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@nested={0x220, 0x34, [@typed={0x8, 0x82, @uid=r2}, @typed={0xc, 0x4d, @u64=0x401}, @generic="074ceea44ec85d5103951ee2f618dec22435bfb0f68384983e971a59e2c6320c42d9ebedab89e951c664a0ea87604e62b65274781b28a623122de13ca810eb745ca7d6d4e76ceb0a6f0c6d593f26fc5bd7ff5b024a7ec5779849031bb224acc2c3e436445b55d4cce121e3f0771c1620", @typed={0x8, 0x4d, @uid}, @typed={0x8, 0x1d, @u32=0x40}, @typed={0x8, 0x62, @fd=r3}, @typed={0x8, 0x21, @fd=r9}, @generic="22b11c5f2272867e9d80f038f1b45df7ee836de2c2b5e243052f22fda36687495d66f48ef0dd3bf9c7cec03475bf7aa73e4143670dba55aec9b31bce5fbd0dbda47f77d6713e5079ebd988", @generic="45bd16ab7a5981ce502d0dc67ce82710639dd32507a1da91a92aadeedf31bf1638192dec5c0e26411d19fe7a387b9ecf22142a9e86babdcab05ba2f996a7ecb1e169c4a9c2f2977aa44daf4269d3da2a163250484484407f4d210c049c80382aff4d49cfd07a63", @generic="657892ac4e1e166d88514958b3b4225ee205e41a772e8e19b710b10397d9f1135f3ab956b6662ae308ee121c0d687e4c26cbceeb88703a77ed2c880468cd117068d851b57459c4750f4a4afcbe6cca2987d31d26a111da076858daddd20fc2714dec08b68b9f7ec896f910fda1c7ba246d1f18bb69db85a016511270bb32ab67e769bca6f3a14427d781c167bd60e9f1b191960101a95fce668b8912b49549ff83e06ec65de10de2129787f250fa50a1f4da5188e9916b56ec576d4bfcc27f1f74f06a29"]}, @typed={0x8, 0x8c, @u32=0x4}, @generic="c0f710041a48e9d90dc8de65f32de742ebdba2e9602bdc9abfac9375aa4b11d11a232fce58f767c5ff0029b37b00ea145df5587c62ed66a89800"]}, 0x274}, {&(0x7f00000000c0)=ANY=[@ANYBLOB="68000000420010002cbd7000fddbdf250400591038d9b2de0b3ce338eee09d32b79b7a93eb41d64fd94fc00b0382919021b3b2967746a0acabab33c279d001b2b3c5b6ed5156da4003e9b69259a2e7d37c27dbc2db868597836387a0a622a744a5f7100dbf000000"], 0x68}, {&(0x7f0000001380)={0x103c, 0x26, 0x800, 0x70bd27, 0x25dfdbfe, "", [@typed={0xc, 0x84, @u64=0x200}, @nested={0x4, 0x18}, @typed={0x1c, 0x76, @str='debug_want_extra_isize'}, @generic="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"]}, 0x103c}], 0x3, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r12, r14, r15}}}], 0x20, 0x20000000}, 0x4000000) 03:33:59 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:33:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="f801000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x6, @ANYBLOB="d00112000c000100697036746e6c0000c0010200080009002900000008000800000000001400030026235e58cad1850f722a1b12de5fb0c314000140fe8000000000000000000000000000bbecff11004e22000008000400070000000800140001040000080010009c09000008000f000308000014000200ff02000000000000000000000000000108000008000200", @ANYRES32=0x0, @ANYBLOB="08000400000000000800050000000000080014000000000008000700000000000800080000000000080006000000000008000900290000000800100000000000040013000800140000000000080011004e2000000800110000000000080014000000000008000f000000000014000300fe8000000000000000000000000000aa080007000000000008000800000000001400030000000000000000000000000000000000080004000000000008000400000000000800050000000000080010000000000008000200", @ANYRES32=0x0, @ANYBLOB="0800140000000000080012000000000004001300080014000000000008000f000000000008001200000000000800120000000000080014000000000008000f00000000000800040000000000080004000000000008000f000000000008001400000000000800090029000000"], 0x1f8}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1000, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) [ 1063.083322] EXT4-fs (sda1): required extra inode space not available 03:33:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1063.156669] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1063.208462] netlink: 388 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1063.223807] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:33:59 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:33:59 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setfsuid(r1) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="64656275675f0400"/36]) [ 1063.405403] netlink: 388 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1063.673268] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1063.856433] kauditd_printk_skb: 492 callbacks suppressed [ 1063.856442] audit: type=1400 audit(2000000040.200:49389): avc: denied { map } for pid=16851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.926610] audit: type=1400 audit(2000000040.200:49390): avc: denied { map } for pid=16851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.985568] audit: type=1400 audit(2000000040.240:49391): avc: denied { map } for pid=16852 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.011644] audit: type=1400 audit(2000000040.240:49392): avc: denied { map } for pid=16852 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.038134] audit: type=1400 audit(2000000040.240:49393): avc: denied { map } for pid=16852 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.064347] audit: type=1400 audit(2000000040.270:49394): avc: denied { map } for pid=16852 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.089342] audit: type=1400 audit(2000000040.270:49395): avc: denied { map } for pid=16852 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.114898] audit: type=1400 audit(2000000040.300:49396): avc: denied { map } for pid=16853 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.146901] audit: type=1400 audit(2000000040.300:49397): avc: denied { map } for pid=16853 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.184716] audit: type=1400 audit(2000000040.340:49398): avc: denied { map } for pid=16854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.343387] kauditd_printk_skb: 626 callbacks suppressed [ 1069.343394] audit: type=1400 audit(2000000045.690:50025): avc: denied { map } for pid=17321 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.376680] audit: type=1400 audit(2000000045.720:50026): avc: denied { map } for pid=17321 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.402773] audit: type=1400 audit(2000000045.750:50027): avc: denied { map } for pid=17322 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.425606] audit: type=1400 audit(2000000045.750:50028): avc: denied { map } for pid=17322 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.673918] audit: type=1400 audit(2000000046.020:50029): avc: denied { map } for pid=17323 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.696936] audit: type=1400 audit(2000000046.020:50030): avc: denied { map } for pid=17323 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.734037] audit: type=1400 audit(2000000046.040:50031): avc: denied { map } for pid=17324 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.757338] audit: type=1400 audit(2000000046.040:50032): avc: denied { map } for pid=17324 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.783135] audit: type=1400 audit(2000000046.090:50033): avc: denied { map } for pid=17327 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.835427] audit: type=1400 audit(2000000046.100:50034): avc: denied { map } for pid=17327 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:06 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "22e0e0a525dc706496bd29c244cafe8a2b889cfc"}, 0x15, 0x4) 03:34:06 executing program 2: symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000008c0)='./file1\x00') lgetxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)=@random={'user.', '$bdevnodev!(eth0trusted{!+\x00'}, &(0x7f0000000180)=""/216, 0xd8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:34:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r5, r6, 0x0, 0x666d) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:07 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) rmdir(&(0x7f0000000100)='./file0\x00') openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() tkill(r1, 0x40020000000c) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pidfd_open(r1, 0x0) llistxattr(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=""/54, 0x36) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0xc48c51bcf4ce3442, 0x0) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 03:34:07 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:07 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1070.746196] EXT4-fs (sda1): required extra inode space not available [ 1070.777396] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1070.819762] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:34:07 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) write$binfmt_misc(r1, &(0x7f00000001c0)={'syz1', "6d9aed45f8de5f833403f2bc15f2554af6e7b0d63405c26043b6407ee691922459129212d7123183edc44c5eed74efd2494d7e963eb24e84cc2b1fe20ab60afdaa3c1a3fbfacf96801e73f20672900bd154be6c3087ccc24e27bce0d1db608a265e67f011118f15b560929dd38649054db8948eee8b86315072d0e1b5dcbb9fc32a507f1af906530d7506c116125cf684af53d40ca7ca01680ad83c7b361b44bc1ff5a6fab9113fe8b60d63d40446991b7e2984908ee598d3336f67926b0c51df40ab20eeb7c842089de"}, 0xce) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:34:07 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:07 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002dc0)=[{{&(0x7f0000000300), 0x10, 0x0}}], 0x1, 0x0) timer_create(0x7, &(0x7f0000000240)={0x0, 0x3f, 0x4, @thr={&(0x7f0000000080)="a0f2931b23de7a4103ef1702b9dda74a787dd649bd865e898cee605628fd61de8bbdc7d4378ba5e64c4551bc33dd865d579321194ac612003cc2dc416dd0eaf1d0d34b207d91cffcb721b5ace2324942175ca64abfa31aac17a270714f51ce2054e969d85ad3df6ac396a16cee1d0b053dd469f13e09e65df94a16c539a90ee7ecf712beaf13c2efeef570157142465858617dccd0a56c5899ac6bc252378055920e4094ec2f10408004778158c608139432d8dbbb001dfafa20f3e0fbdbc3bbd97e6b5ca505bc38e2bde9da1c1b7641ae87d9ce2e1d8db7d702b3385b161dc38c2389c2", &(0x7f0000000180)="13e7388e16be5c320b9f51b310c0e20a83e38e6d3c09ba69a3b6edb66f9442047c4f268fc0693e7a8c8f53b94e0945c0d09d1ba4b9948abdb4930381b2d85b8be1e1721ee7ee3c3254adf4334b9c1bf211e5172dc436d5f187208fc5ea24371228eb01dd11d990d458af07d49a3e2e591692757f9c4380c5c2949c59430497f13abbf40d57e8b0d903fa52509be819b1f9bb"}}, &(0x7f0000000280)=0x0) timer_delete(r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 03:34:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:07 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x1, 0x0, 0xfc, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffbffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x20010, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = dup3(0xffffffffffffffff, r0, 0x180000) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000b00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x34, 0x0, 0x2, 0x70bd27, 0x0, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x2b}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mremap(&(0x7f0000526000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000388000/0x1000)=nil) setrlimit(0x2, &(0x7f0000000040)={0x0, 0x2000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(0xffffffffffffffff) socket$inet6(0xa, 0x80002, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r9, &(0x7f0000000ea9)=""/407, 0x197) ioctl$sock_inet_SIOCGIFADDR(r9, 0x8915, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r9, 0x0, 0x483, &(0x7f00000000c0)={0x8f, @broadcast, 0x4e20, 0x0, 'lblcr\x00', 0x1, 0x0, 0x2d}, 0x2c) 03:34:07 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff4e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000680)=""/200, 0xc8) flock(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{0x0}], 0x1, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) timerfd_gettime(r1, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') readahead(r0, 0x400, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000080)={0x4b6d, 0x8d, 0x1, 0x1ff}) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x6c, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0x86cfc402964e2d5c, 0x0, 0x0, 0xfffffffffffffeda) [ 1071.485734] EXT4-fs (sda1): required extra inode space not available [ 1071.510209] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:34:08 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1072.188311] EXT4-fs (sda1): re-mounted. Opts: 03:34:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:08 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1074.355096] kauditd_printk_skb: 246 callbacks suppressed [ 1074.355107] audit: type=1400 audit(2000000050.700:50281): avc: denied { map } for pid=17465 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.383827] audit: type=1400 audit(2000000050.700:50282): avc: denied { map } for pid=17465 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.407214] audit: type=1400 audit(2000000050.710:50283): avc: denied { map } for pid=17466 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.429913] audit: type=1400 audit(2000000050.710:50284): avc: denied { map } for pid=17466 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.453114] audit: type=1400 audit(2000000050.710:50285): avc: denied { map } for pid=17467 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.476218] audit: type=1400 audit(2000000050.710:50286): avc: denied { map } for pid=17467 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.499605] audit: type=1400 audit(2000000050.730:50287): avc: denied { map } for pid=17468 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.522007] audit: type=1400 audit(2000000050.730:50288): avc: denied { map } for pid=17468 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.547542] audit: type=1400 audit(2000000050.760:50289): avc: denied { map } for pid=17469 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1074.570378] audit: type=1400 audit(2000000050.760:50290): avc: denied { map } for pid=17469 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:13 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:13 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e6c0a0657a8a09f7000000000000001013000"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x40) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) sendfile(r0, r1, &(0x7f00000000c0)=0xffffffffffffffff, 0x10000) r3 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x7f1f1222737074d5) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB='debug_want_extra_isize=0x@000000000000001,\x00']) 03:34:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000d80)=ANY=[@ANYBLOB="1c0000006afb243da4cbed8448acf38e6d500200001600000000d7a6e649d968086b35e5f2aadc8689ec72c3", @ANYRES16=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x800a5}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xfd, r5, 0x100, 0x70bd29, 0x25dfdbfe}, 0x84}}, 0x8800) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10004000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r5, 0x100, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4000041) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x102}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'eql\x00', 0x3ed8f24c44c677b2}) dup3(r0, r2, 0x0) 03:34:13 executing program 4: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) r4 = dup3(r1, r3, 0x1c0000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r4, 0x29, 0xd3, &(0x7f0000000540)={{0xa, 0x4e21, 0x9, @local, 0x6}, {0xa, 0x4e21, 0x2000000, @mcast2, 0xffffffff}, 0x3, [0x1f, 0x3, 0x6, 0x2e9d, 0x4, 0x8, 0x3, 0x5]}, 0x5c) socket(0xa6383489624e47d3, 0x6, 0x7) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/105, 0x69}], 0x1, &(0x7f00000001c0)=""/107, 0x6b}, 0x40008020) sendfile(r7, 0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 03:34:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:13 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:13 executing program 4: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:13 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) write$P9_RLOPEN(r0, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0xb9, 0x2, 0x7}, 0x9a9}}, 0x18) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:34:14 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1077.676728] device eql entered promiscuous mode 03:34:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:14 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20007, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/arp\x00') bind(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f00000015c0)=@hci={0x1f, 0x0, 0xe72730f593b299bc}, 0x80) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/10}, {&(0x7f0000000240)=""/205}, {&(0x7f00000000c0)=""/40}, {&(0x7f00000003c0)=""/213}, {&(0x7f0000000080)=""/59}, {&(0x7f00000004c0)=""/77}], 0x3c4, 0x80000001) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000140), 0x1c) socket(0x0, 0x0, 0x0) inotify_init1(0x800) alarm(0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xb) socket(0xa, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) 03:34:14 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9067f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35110832bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e7d3b9df6001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80001, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="3400000018000000000000000000000001da18f5432d1e41", @ANYRES32=0x0, @ANYBLOB="1800010014"], 0x3}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:34:14 executing program 4: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1078.332247] EXT4-fs (sda1): required extra inode space not available [ 1078.385973] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:34:14 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, &(0x7f0000000040)={[{@noload='noload'}], [{@dont_hash='dont_hash'}, {@euid_lt={'euid<', r1}}]}) 03:34:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:15 executing program 4: open(0x0, 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1079.373503] kauditd_printk_skb: 509 callbacks suppressed [ 1079.373513] audit: type=1400 audit(2000000055.710:50800): avc: denied { map } for pid=17713 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:15 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x89e075c6183512e7, 0x85) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) readv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000041c0)=ANY=[@ANYBLOB='n'], 0x1) ftruncate(r2, 0x8200) readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001a80)="7e41fa5187b24faad28debb8801d32f232b576da3626b53b5a463d5590e61ac02ea3c5e370643aa168a139858aa09d3e1a2051ddb80c4e79b1c8779bd73d6ae106b742a5a0117ffa6bcca41323735a94f28300f94733ae8de8e98b4fe56f2dc2323b5c4e2fd0e34c95d7fd8cda93129cddb2c8d122d2a16ed50750a147e6480de5ee100a2efcabde3819bfcd807b2ae4ea62a94fda4d56557fe474e40ad01faa9c4b9fdf15c70f7cb0f72cedfd13afffd0d9a7606373d054eb81decade6db18010c31e1d06608e46dc918d47635db1ed8038b40e3d7a8159be5a9924cc0fdfdc3146695a1e97eaf075a597", 0xeb}, {&(0x7f0000001b80)}], 0x2, &(0x7f0000004bc0)=ANY=[@ANYBLOB="100000000000000084000000018000002800000000000000080100003f0000007e063ea83338b08ea313277915f67ea377e8050000000000e8000000000000000000000001000000eb48f8a6394eb55833a36e90b9737a550497b1250f42000701519430120203f5c8772bde451d5bb6218b5bc5062f798d6d2d4d28346436637024edceb6d2fa4d6b1a93f18cacd1ef8b882111ed2fb2a992428657e24920a69f1e0c20d95aaa90e0c0ed9b06e1f2fa58203e9b81c61fd676dee8077eefb3066bbd02d2a276b0ae21dcfa91fc1a1d1d22c682ab2d6c06ed8abb056aa1c967cfec61b493394e419c58de90948999104c8ff1246cf97999b1fab39b4b9addb3256cc2b9563a02225f6eaef89058c5f3752767e22c3e000018000000000000001701000001000000cd4f520ea80cbb00a8000000000000001c01000000000000a86341ca3ff866e3de1851a6861fe944df7b8bb42fb3a3544720ea172df40ae1d971c02b4a6eda8ce73a6c170b8e7878f246179243fa4f34ff2218fc8d53da38a5ee10817aaae6f16fa85add2c0567003fe905e72d088542c65ca4be229b955263a0d67bbcdb1e8734ff4a06ef7f2a0e6d6a4145f27080ed75629fbdce8f9bb1e097375280d110202fba4c79f30dd4898de8d75896136a00a00000000000000000000000030000007ba1c0383a238255c888bff94d51e76df3ebd97e760d67e30e5294e7666867bd6cc6d0036a6a27db14e29e113aec575272a97f3adfb0be1bdf822ca6f72ce7cc8bdb3cc5d0295a2547118acb953ded5fed84684fbbd2e714ee64156e6bd8a9e43373d0a9fc77a83e16216c6208dfb331bbfb49b6b5c0ee6751ea3126e6fe9f52ca0212292f241512e7a76f50370000001800000000000000010100ff7f0000003ea54ff25f48b258080100000000000014010000090000003cd048a571d4c7dcd375012c7b1411fdf1c60a250bd6a89eb537425e887e66c55bf317dc337cad414cf4c1151d8865a3b29707c68f25b59308a15d6be536e9c506603a21b2c24c0ebb063757ad4529b971c096207f1a2772b0c4c3459442f83a698c8fd73e4f3c0c7f1d941a87bd68fd25c8265502c34db8ca5c8ba9c25cda01758719d45fd0615c86a59db391bd5533dac7d32778c8a6f85ae897ab0653b317785551425801b6ec383b1d877a4e3ca5b1c649683e6ecd831c39ed9b153790ba1d5dbb7affcc98ae6f23787944a1530d919494f630ab90f6885097074151c214bd4889ad3a145a8509443c3c80d3d0855ce55d430000000097cef5eeadc32b1a4f020270ea8e5ced1f54132214797b221b8172ea5b6e84da3533bca46e4cee1fe404f591428d5cd2f3"], 0x3c8}}, {{0x0, 0x0, &(0x7f0000002180)=[{0x0}, {&(0x7f0000002100)="bf8ebbeedbfcb46cb73cbeb056331e2158b30c13d46be1f9c4b483dace42192c0c26a23f739745f8892ec821313a421f46a36c9a92f2e0c595aec6d55980f341c32b323c9e7f44ec7fafdf277da889dab632bba1903cc71a5c18dfec126a4d830905d7588c7080a777d141ecb7b2ff306e50c162f556fe02b032d6", 0x7b}], 0x2, &(0x7f0000003440)=[{0xf8, 0x1fb, 0x4, "715e26c3bc6ba46889463d3a65f5c87ccfeb6b68b2ea519cf84dcd87d7a0bbd9ba9190df454c3436f83b8768c603a1f931b06d6a2adeef5efbfdb0158033357f14815e73cde7ba6873f5c133a98cfbc7e99e9f9930b3a0734719f4574bd9977b2eea66389aff7d09a3bb82e4f63b0c27dc7adef88199bd6f29b55191820237f465895cfdef6162b9f81ec34b5172a858110906233494a20a21086b948f433715dc644aefff7786a5d4219c88930bd61b3818014b54fe5fa2952a88558201ceb3de29110a3ac6a8602dfba78b063fdd01a9f4939503759efedadd6df408d39fe6fca1c12a0c96189c"}, {0x38, 0x108, 0x0, "404c3875d439110e4895117296554de34270691d68c60b2d417be0b92a3f4208c79291beaf2b"}, {0x50, 0x1dd, 0x3f80000, "1c464a08eb64d5d44e0e76387c9aec466ed9dcde0bf5a0919225505c2122beace4f01c7dd43c604c42082de86cefa7c4097d711ca4ef5b0a4d"}], 0x180}}], 0x2, 0x4021000) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000001ffc382ebd5ec0e6657c9145d1296714af248d32825ef82b6734e5a38b13b2a46b2896069e668e8af31c3e8132551000381668850a81eeb9a2f641de9e0242cef3fe27cf3d66e7e95c0ad3beef88e12f7a1d12d335f13fb31f86c7f35eba437b058cc620229d7839683afcd80a204fc04a0242b49ff12289013cbf84707dc92051a5b19b1c7aa64501f2ec145d5db86598e85d7ee97c8cc1a2d7bc47c3bb8c96e466d3ba2aedf6639bc5228b0e1b3140c6c0f8cd6dceece8dc3ff9c7"], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) [ 1079.568548] audit: type=1400 audit(2000000055.770:50802): avc: denied { map } for pid=17713 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1079.660107] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 1079.722686] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1079.800146] audit: type=1400 audit(2000000055.770:50803): avc: denied { map } for pid=17713 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1079.826134] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1079.882431] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1079.931960] EXT4-fs: failed to create workqueue 03:34:16 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="64656275675f77616e745f657874f2612590aeee5f6973697a653d30783030703030303030303030303033"]) [ 1079.960320] EXT4-fs (loop0): mount failed [ 1080.011466] audit: type=1400 audit(2000000055.750:50801): avc: denied { map } for pid=17714 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:16 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) symlink(&(0x7f0000000280)='./file1/file0\x00', &(0x7f0000000140)='./file1/file0\x00') r0 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000080)={0x0, 0x5, 0x8, 0x9}) mkdirat(r0, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file1/file0\x00', 0x2) [ 1080.132888] audit: type=1400 audit(2000000055.830:50804): avc: denied { map } for pid=17714 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1080.284799] audit: type=1400 audit(2000000055.830:50805): avc: denied { map } for pid=17714 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1080.444594] audit: type=1400 audit(2000000055.840:50806): avc: denied { map } for pid=17716 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1080.565485] audit: type=1400 audit(2000000055.850:50808): avc: denied { map } for pid=17717 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1080.672541] EXT4-fs (sda1): Unrecognized mount option "debug_want_extòa%®î_isize=0x00p00000000003" or missing value [ 1080.683720] audit: type=1400 audit(2000000055.840:50807): avc: denied { map } for pid=17716 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1080.798031] audit: type=1400 audit(2000000055.850:50809): avc: denied { map } for pid=17717 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1084.943084] kauditd_printk_skb: 652 callbacks suppressed [ 1084.943091] audit: type=1400 audit(2000000061.290:51462): avc: denied { map } for pid=17996 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1084.970816] audit: type=1400 audit(2000000061.320:51463): avc: denied { map } for pid=17996 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1084.993292] audit: type=1400 audit(2000000061.320:51464): avc: denied { map } for pid=17996 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1085.273598] audit: type=1400 audit(2000000061.620:51465): avc: denied { map } for pid=17997 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1085.296470] audit: type=1400 audit(2000000061.620:51466): avc: denied { map } for pid=17997 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1085.329068] audit: type=1400 audit(2000000061.660:51467): avc: denied { map } for pid=17998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1085.352258] audit: type=1400 audit(2000000061.660:51468): avc: denied { map } for pid=17998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:21 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:21 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = geteuid() r5 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='net/unix\x00', 0xfffffffffffffffe) keyctl$get_persistent(0x16, r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x1, 0x23, 0x2, 0x2, {0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7fff}}}, 0x80) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r6, 0x0, 0x800000bf) 03:34:21 executing program 4: open(0x0, 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:21 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2e2f66696c6530b0b22c243e8f8c8fbbccfe98520eb1296ba7626d9caa04fe4a6e9fad537d09b63b94b1d0af8564b8e734931632ff0a2dd0c6f8dc3dfbbe53c8cf9589e7302733d074b8bfd705a86d43d947c17892ce2e46066095c99ee5533a497991ad374aaf8dd81a7c7710cabc1eead8c03a1a66c998738763cce2787041fdbee64cad3b12d27686ff265836d414ccf2a37dfe4bea518ae8f43859faea6d081c7f81ae58a63cfc152e5c61285820e81d"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:34:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:21 executing program 0: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) setxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='\x00ser\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000300)='\xe1\xd6\x8b\xa2\xfa\x141\x8c\xe0\x06\x00\x00\x00\x86\xc0\x83g\xfcVa\xad\x8bH\x88\xe2\xe12\x1a\xfa\x8f\xd9_\xe3*;\xac\x1ef\x9a\xca\aW\x95jH\x03\x19_\x8b1Q^\x9a?t\xb4\fT\x13}~\x8aU\x87\xa8?\xd2^\x89^\x92\xb5\xdap\r\xe8\xbcZ\xd18\x0e\x1ak\xf2Z*\xd3\xba\xafA\x14\xe4\x19\xe4\xe7\xd7\\1\x018\xbf\xc5\xda\x06\xf9\xa9\xcf\x14?\xc9c\xa2\x8f\xc9\x9dM\x89\xcdJ\x03\r/0x0) ioctl$TUNSETOWNER(r1, 0x400454cc, r5) socket$inet6(0xa, 0x0, 0x0) r6 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r7 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r6, &(0x7f0000000600)="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", 0x200) sendfile(r6, r7, 0x0, 0x666d) sendfile(r6, r7, 0x0, 0xa195) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r7, 0x0, 0x8, 0x80, 0x4f1}) socket$inet6(0xa, 0x4, 0x1) syz_open_dev$binderN(0x0, 0x0, 0x0) [ 1085.376057] audit: type=1400 audit(2000000061.720:51469): avc: denied { map } for pid=18001 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1085.398610] audit: type=1400 audit(2000000061.720:51470): avc: denied { map } for pid=18001 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1085.450668] audit: type=1400 audit(2000000061.740:51471): avc: denied { map } for pid=18002 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, 0xffffffffffffffff, 0x0, 0x60) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000080)={0xfff7, 0x1, 0xc, 0x8, 0x1ff}, 0xc) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000180)="8879e8a47c358857fd854621b511ab4bc7f4075e51ad1cdb58de33d40836747a13abf1c19e45a297c6765e2c7b988efab4f7f1abf7970ba730d4385ea6b379dfb35387fce05cd77089de10ed8485601c7fd1e40378754d9dc950661b2ac4da501c8380afa689854e605468abba1a25d5c901bcb92fa44900b4bb6ad88a22a95b3cd0bf63e0389ab6c4916088979dcc10d75bb3dd9d6c623206ea2e66121b9aa34b0cf895", 0xa4) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e22, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:34:21 executing program 4: open(0x0, 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:21 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000800)=ANY=[@ANYBLOB="090000006c6530683253f38818dcad35b7e6d8ada0882663d7f68cb2c3d4b889cee056cd8b6d0739ec98ff7d07ed6a6162a4493d6e4f1f3804f0eb65919d08f1b91bc3b68a744e2c2f5b5d38ef19db10724209b80a205cb3a9b35184f76c9bac8397f4072299989db602c5f013092001b05c2d726940171dcfa6af8b8686506bbbaad53e407e5573d7f98496"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) io_setup(0x8, &(0x7f0000000200)=0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000540)=0x9f) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r7, &(0x7f0000000600)="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", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) io_submit(r2, 0x3, &(0x7f0000000500)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2, r1, &(0x7f0000000300)="1837d6a11633366550693a56b9adfcd25ab4e90fe6659ba529a94f2683e604c793fee1c24e430125990e65939d8f2f0b8c8c4675e62449adb5659e7410223cb6f66eb2dda4a3b577d697b40984942a8cbed526e66dfa5e74458b1c68e654bb152168a6f0be44543fd4e684d0a90aa2e18a8e7aaf9616c7318f7ef3dd8b28b4b6495ba5ab499de62de5033ac5de6a44fc9a12e42a579db9eb9595a4e257262b67e5c2d4635964e58307fee90cc920b11baffd", 0xb2, 0x3, 0x0, 0x6, r4}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7b6d3559da015aa2, 0x1bc0, r0, &(0x7f00000003c0)="271815352008b99915fd695f4965d50c703f99da03cfe0c33d1de8ced2b0c5d2ea7c052d31663bf81c2a45c4", 0x2c, 0x3, 0x0, 0x1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1000, r5, &(0x7f0000000440)="1f9e96f5721e1eb8c14ec7963c1b795de8b9d987e0726eb45b2e566429e9e69b5b094a69a10ef58c89d6c5f3262278b43fac21d0a939ce7549ff909ef8fc4b607abf5023", 0x44, 0x10000, 0x0, 0x1, r7}]) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f00000001c0)=""/52) futex(&(0x7f0000000040), 0xcb259d3de0e0c637, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x1) 03:34:22 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:22 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(0x0, 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:22 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x0, {0x1, {0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20a, 0x9, 0x0, 0x8}}, 0xa0) sendfile(r0, r2, 0x0, 0x200fff) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r3 = syz_open_procfs(0x0, 0x0) getdents64(r3, 0x0, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000100), 0x0) prctl$PR_GET_SECUREBITS(0x1b) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000140)) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/125, 0x26d) getdents64(0xffffffffffffffff, 0x0, 0x0) 03:34:22 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:22 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r1, 0x2008002) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8482) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) fdatasync(r4) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 03:34:23 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) setxattr$security_capability(&(0x7f0000000040)='.\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x9, 0x8}, {0x5, 0x800}], 0xffffffffffffffff}, 0x18, 0x3) r0 = geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f00000008c0)={[], [{@context={'context', 0x3d, 'root'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'security.capability\x00'}}, {@uid_eq={'uid', 0x3d, r6}}]}) r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r9, 0xc0184908, &(0x7f0000000480)={0x34, 0x0, &(0x7f0000000440)}) write(r7, &(0x7f0000000600)="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", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) ioctl$EVIOCGKEYCODE_V2(r7, 0x80284504, &(0x7f00000001c0)=""/189) 03:34:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r2, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:23 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:23 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) r2 = accept$inet6(r0, 0x0, &(0x7f0000000040)) pwrite64(r2, &(0x7f00000000c0)="2e3bdf76fe1136f754e9551328896c71cf83ae60d86302f9bb8e12f58d88fc53eb7ffb0eda970aae1cfb47c86031cf5af390b8d8c6a93ed4ae0bc0a8d8bdf46d06708a01b47ae6788ae320be6489", 0x4e, 0x81) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:34:24 executing program 0: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000080)=""/88, &(0x7f0000000100)=0x58) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) write$selinux_create(r1, &(0x7f0000000180)=@access={'system_u:object_r:hwdata_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x8}, 0x43) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:34:24 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x7) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778, 0x5f2}, 0x0, 0x0, 0x0, 0x0, 0x200000004000007}, 0x0, 0x6, 0xffffffffffffffff, 0x4) dup2(0xffffffffffffffff, r1) r2 = socket$nl_route(0x10, 0x3, 0x0) write(r2, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) fcntl$lock(r3, 0x6, &(0x7f00000001c0)={0x3, 0x3}) ioctl$RTC_SET_TIME(r4, 0x4024700a, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) fcntl$getownex(r5, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x70}, r7, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) read$char_usb(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) r9 = gettid() tkill(r9, 0x40020000000c) r10 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r11 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r10, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r10, r11, 0x0, 0x666d) sendfile(r10, r11, 0x0, 0xa195) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r10, 0x0, 0x11, &(0x7f0000000180)='net/softnet_stat\x00'}, 0x30) syz_open_procfs(r12, &(0x7f0000000500)='net/softnet_stat\x00') io_setup(0x2, &(0x7f0000000080)) preadv(r4, &(0x7f00000017c0), 0x1fe, 0x500) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6}]}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 03:34:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1088.595324] EXT4-fs (sda1): required extra inode space not available [ 1088.637842] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1088.871708] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1089.950703] kauditd_printk_skb: 393 callbacks suppressed [ 1089.950712] audit: type=1400 audit(2000000066.290:51865): avc: denied { map } for pid=18131 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.040240] audit: type=1400 audit(2000000066.300:51866): avc: denied { map } for pid=18131 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.074184] audit: type=1400 audit(2000000066.300:51867): avc: denied { map } for pid=18131 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.111827] audit: type=1400 audit(2000000066.300:51868): avc: denied { map } for pid=18131 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.137994] audit: type=1400 audit(2000000066.310:51869): avc: denied { map } for pid=18131 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.164889] audit: type=1400 audit(2000000066.310:51870): avc: denied { map } for pid=18131 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.199855] audit: type=1400 audit(2000000066.330:51871): avc: denied { map } for pid=18130 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.234722] audit: type=1400 audit(2000000066.330:51872): avc: denied { map } for pid=18130 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.259657] audit: type=1400 audit(2000000066.340:51873): avc: denied { map } for pid=18130 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.285244] audit: type=1400 audit(2000000066.340:51874): avc: denied { map } for pid=18130 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:30 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2e3066696c6599e71c28287ee7226e34cf50f7c22fbbffbed47d288cbbaa238308cdad21074363eacd84902c45b98a47d562d45d4faaf97fd302ee25b55c79d0e206e6f933b91c524d48f5bf38ef2cd8bd85896d736bb79e61d0639fe01171783de85739e3"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x6) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r1, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "f1b891890b837474a5890cd9f43b0adc"}, 0x11, 0x3) 03:34:30 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:30 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(0x0, 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:30 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, &(0x7f0000003480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) ioctl$sock_TIOCINQ(r6, 0x541b, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r9, 0x541b, &(0x7f0000000100)) r10 = socket$unix(0x1, 0x0, 0x0) bind$unix(r10, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) connect$unix(r10, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r10, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r10, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r10, 0x0, 0x0, 0xc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r13, 0x0) r14 = socket$unix(0x1, 0x2, 0x0) bind$unix(r14, 0x0, 0x0) connect$unix(r14, &(0x7f0000000140)=@file={0x3d5d8456ac458b37, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r14, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r14, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r14, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) sendmsg$unix(r6, &(0x7f0000000e80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="face851b3a499bb8cb0ad66684b5fbf28f0f5f7f699c373ec437cd19e4c92f437be066a66e38a0aafeceac42d67e74b9d3f1efeca4350e19484790dbedaad35cb12538c303003937cc92097da96db2e0912b951c3d483ca26988d1f61754922736afea99af15f693509e43eae2ec954c18590f27cc79e6805a2c1648f67dce068ee9ac5f336b7f46cab1d6956849904e7b1f", 0x92}, {0x0}, {&(0x7f0000000200)="d1cf1095f1dbf97abf66f8d6a25d942e3dcbc363fa09d2be2f9933d3e60be4", 0x1f}, {&(0x7f00000006c0)="c9e60d0469bbddef03387ac6827ecc3069dcc77f97dd65f690ca3fc21736c4ff8d13ec7d277a8ac548a89b23d8d895a4d1e643f9a33b8af9b9390d2a1448969f91e26daaa12e93380c2626cde597b3ffd063a93e2d", 0x55}, {0x0}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r7, r8}}}, @rights={{0x1c, 0x1, 0x1, [r9, r10, r5]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r13}}}, @rights={{0x18, 0x1, 0x1, [r14, 0xffffffffffffffff]}}], 0x98, 0x40000044}, 0x8000) r15 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r16, &(0x7f0000003480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) ioctl$sock_TIOCINQ(r16, 0x541b, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r19, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r19, 0x541b, &(0x7f0000000100)) r20 = socket$unix(0x1, 0x0, 0x0) bind$unix(r20, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) connect$unix(r20, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r20, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r20, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r20, 0x0, 0x0, 0xc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r23, 0x0) r24 = socket$unix(0x1, 0x2, 0x0) bind$unix(r24, 0x0, 0x0) connect$unix(r24, &(0x7f0000000140)=@file={0x3d5d8456ac458b37, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r24, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r24, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r24, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) sendmsg$unix(r16, &(0x7f0000000e80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="face851b3a499bb8cb0ad66684b5fbf28f0f5f7f699c373ec437cd19e4c92f437be066a66e38a0aafeceac42d67e74b9d3f1efeca4350e19484790dbedaad35cb12538c303003937cc92097da96db2e0912b951c3d483ca26988d1f61754922736afea99af15f693509e43eae2ec954c18590f27cc79e6805a2c1648f67dce068ee9ac5f336b7f46cab1d6956849904e7b1f", 0x92}, {0x0}, {&(0x7f0000000200)="d1cf1095f1dbf97abf66f8d6a25d942e3dcbc363fa09d2be2f9933d3e60be4", 0x1f}, {&(0x7f00000006c0)="c9e60d0469bbddef03387ac6827ecc3069dcc77f97dd65f690ca3fc21736c4ff8d13ec7d277a8ac548a89b23d8d895a4d1e643f9a33b8af9b9390d2a1448969f91e26daaa12e93380c2626cde597b3ffd063a93e2d", 0x55}, {0x0}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r17, r18}}}, @rights={{0x1c, 0x1, 0x1, [r19, r20, r15]}}, @cred={{0x1c, 0x1, 0x2, {r21, r22}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r23}}}, @rights={{0x18, 0x1, 0x1, [r24, 0xffffffffffffffff]}}], 0x98, 0x40000044}, 0x8000) getgroups(0x7, &(0x7f0000000240)=[0x0, r13, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, r23]) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r28, &(0x7f0000003480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) ioctl$sock_TIOCINQ(r28, 0x541b, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r31, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r31, 0x541b, &(0x7f0000000100)) r32 = socket$unix(0x1, 0x0, 0x0) bind$unix(r32, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) connect$unix(r32, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r32, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r32, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r32, 0x0, 0x0, 0xc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r35, 0x0) r36 = socket$unix(0x1, 0x2, 0x0) bind$unix(r36, 0x0, 0x0) connect$unix(r36, &(0x7f0000000140)=@file={0x3d5d8456ac458b37, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r36, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r36, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r36, &(0x7f0000000400), 0x0, 0xc0) sendmsg$unix(r28, &(0x7f0000000e80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="face851b3a499bb8cb0ad66684b5fbf28f0f5f7f699c373ec437cd19e4c92f437be066a66e38a0aafeceac42d67e74b9d3f1efeca4350e19484790dbedaad35cb12538c303003937cc92097da96db2e0912b951c3d483ca26988d1f61754922736afea99af15f693509e43eae2ec954c18590f27cc79e6805a2c1648f67dce068ee9ac5f336b7f46cab1d6956849904e7b1f", 0x92}, {0x0}, {&(0x7f0000000200)="d1cf1095f1dbf97abf66f8d6a25d942e3dcbc363fa09d2be2f9933d3e60be4", 0x1f}, {&(0x7f00000006c0)="c9e60d0469bbddef03387ac6827ecc3069dcc77f97dd65f690ca3fc21736c4ff8d13ec7d277a8ac548a89b23d8d895a4d1e643f9a33b8af9b9390d2a1448969f91e26daaa12e93380c2626cde597b3ffd063a93e2d", 0x55}, {0x0}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r29, r30}}}, @rights={{0x1c, 0x1, 0x1, [r31, r32, r27]}}, @cred={{0x1c, 0x1, 0x2, {r33, r34}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r35}}}, @rights={{0x18, 0x1, 0x1, [r36, 0xffffffffffffffff]}}], 0x98, 0x40000044}, 0x8000) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x4, r4}], {0x4, 0x7}, [{0x8, 0x6aeeeb7e25e4cccb, r25}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2, 0xee01}, {0x8, 0x2017f7c664b14941, r26}, {0x8, 0x2, r35}], {0x10, 0x1}, {0x20, 0x5}}, 0x54, 0x2) sendfile(r2, r1, 0x0, 0x8) r37 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r37, 0x8912, 0x100000000400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)="5500000018007f5300fe01b2a4a280930a600000ffa84309910000003900090035000c00060000001900150005000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x328}], 0x1}, 0x0) 03:34:30 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f0000000040)=0x8, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2c65b6ae2e133d5f00003c1c12e2fc00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1], 0x2c}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(r2, 0x0, 0x3f, &(0x7f0000000200)={@remote, @local}, &(0x7f0000000240)=0xc) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x0, 0x120, 0xa55c91fed3cc2212}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:34:30 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(0x0, 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:30 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:30 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:30 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="2e2f66696c6530045873cdf6694720301e4b256009535fd1afe6ce256665ac6e072ddba1cf8e251bdcacce3590f3bed55b3c11c86b77b48399ba0a6cc8e1938cc26ca06d85f245a5fabe568382fb5b98a6b08d6715fa10e2cfaede28ccac9d9749235d5fccd435f367c45b5a9cb9cc93f65da2f29c78c7f25d5e5a4bf19b5770910ef3bc99093a37961ad4d38713f275"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="64656277675f775f6e745ff8787472000000000000006c3030303230303030300130301d3330302c000000"]) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000300)="411fcdb12ac7da140d0973ff9b94414c985f8beef45967c2bc9b01419c463c4f1d3d485493e3ca61c92a896bd1444967267af12237225b76c193fa564d7f02757a13f61d4ed50d6115e7870ec010717754ee1b9f997735f7da21dbd6c62c7c5918d7067204f898eadaaa0d20dfae479c313d9e929d904fcecfdb43b4b9c26af3208c4e1dbce480b1bcb9a7e328b16fdbcb2b1322c386acc76d3b037e19c333506bc0677c20d6d0377d9d68c64da8db9e7fb8a60666ee2855e807e7f5f9a61f811ee73e34630860ee0a", &(0x7f0000000400)=""/83}, 0x20) sendfile(r2, r3, 0x0, 0xa195) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)='security.capability\x00', &(0x7f0000000580)=@v1={0x1000000, [{0x40, 0x8}]}, 0xc, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f00000001c0)="77cb25f5695bfddda8753dab32ffabcac1d2046bc28a2c107d3923e5668c4e8526044409a29ba1e688efa772b4ca69b0e6d219f850d5c7a793221d485a5cdd8f615471d55810edd9f88a2ace9227f9849e175048c51d44768d4a9c608f19118a215055952175ff5493105a8e215a7a159950c211a2fbd0f1c360af50418e25c82b35f7383bc55270cd52858ccd8b8ffd158a9d3c7ebc6959a81d2261"}, 0x20) r4 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x666d) sendfile(r4, r5, 0x0, 0xa195) r6 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r7 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r6, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r6, r7, 0x0, 0x666d) sendfile(r6, r7, 0x0, 0xa195) renameat2(r5, &(0x7f00000005c0)='./file0\x00', r6, &(0x7f0000000900)='./file0\x00', 0x2) sendfile(r0, r1, 0x0, 0x666d) fcntl$setstatus(r1, 0x4, 0x400) r8 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r9 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r8, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r8, r9, 0x0, 0x666d) sendfile(r8, r9, 0x0, 0xa195) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000008, 0x50, r1, 0x129cd000) write$selinux_load(r8, &(0x7f0000000800)=ANY=[@ANYBLOB="8cff7cf908000000534572ad6d204c696e7578e3d448456454c6f94a47119cb005d6dd305ac41f2168ceccc15ca9131b8e486e8b949cdd5da996214b0d1bfdc8d8822904cfcf4798253d7913809a4ffb2903b0fbf1e4980e9f82926557269ebe522314bb089db3e91c8b7bfd40134706f532120732e25553dc7b162b56416d7563def9138cc439d0ee4015ca2941302a1eee3949d190851dda8b26c171c5cccbba47c0be507706da2c154c25acfc7def424c09bd42e8e027b1856ffad5cd92de36"], 0xc1) sendfile(r0, r1, 0x0, 0xa195) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0x7}, 0xf) 03:34:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:31 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1094.896078] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1094.963437] kauditd_printk_skb: 534 callbacks suppressed [ 1094.963447] audit: type=1400 audit(2000000071.310:52409): avc: denied { map } for pid=18395 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1095.154594] audit: type=1400 audit(2000000071.310:52410): avc: denied { map } for pid=18395 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:31 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getitimer(0x1, &(0x7f0000000380)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_GET_KEEPCAPS(0x7) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() unshare(0x20020000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020001) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000078c0)=@req={0x2, 0x0, 0x101, 0x1}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x3) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000340)=ANY=[]) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/enforce\x00', 0x40, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000440)={0x17, 0x56, &(0x7f0000000680)="6969450711be14ee2c1721bf0a89049f914636ca240ac6cd4ca573d72cadb618c776b22a98069f499b7370b0884070b86432801bb83ab1b6f3c02f57175a0b9e264f4817f80f7c07583b4d25f656528a39a2204f0a85"}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000077c0)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000004c0)="a41045da73b0649c07c186114cc1bc477157a58c8eaeaae7d181073933d24ca00c6d4d5ee971c7ae60dfb3980e4f2294b154176cf018b395cbc842a89efa818c790ad9e28af6b19f727fc8efc3098920c08cc0c7f1a7500424956e0a08bb39e9fb03fc7f2586f2d63e4b189f76dd4beadbc2a521563f7d349cbb6f70d61ad63cdb90311e49f4b4da4f8350fadce7dbc1bb741ebfb68b50ca6afecac21df68d8074582432b9123b73d94f42e844a3b19e2d", 0xb1}, {&(0x7f0000000600)="a5282162ebcfd05a6b365587c13b270cc4873d192d7d4348fba41aa01d5820a1b6e3f8e5e3340a906a0a01d4c3566a7bcd2ad51ef3db36a2bc7ff16b86dc7c1ddd5b7730f92ea99cff2349", 0x4b}, {&(0x7f0000000100)="269c569d5e", 0x5}, {&(0x7f0000000740)="a18e62535441ee4858c9b8f73ca5538f074a410d2598cba9d4bcf4eb9d7b6fd302d838dcf129c0f19c0ca6f005808933ebd33e01efaa108731ce559f2acc0893eaac60d3e54c6332a6ced668543086f507cb4cb9684a184257d72b6e7f46e51487", 0x61}, {&(0x7f00000007c0)="a6ab584593b0f79389e64ad9cd43a32d41d5ed48125ff13eea96a6e96043b30764294848b4e96d67f70ecb", 0x2b}, {&(0x7f0000000340)="22af0f7b3efe42f77abb900d79c18e44bb9f1f525d19aacd", 0x18}, {0x0}, {&(0x7f0000000940)}], 0x8, &(0x7f0000004fc0)=ANY=[@ANYBLOB="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"], 0x2156}}, {{&(0x7f0000000580)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c, &(0x7f0000004f40)=[{0x0}, {&(0x7f0000003e40)}, {&(0x7f0000003ec0)="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", 0xb78}, {0x0}], 0x4}}], 0x2, 0x4000) rmdir(&(0x7f0000000700)='./file0\x00') truncate(&(0x7f0000000080)='./bus\x00', 0x0) 03:34:31 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1095.255263] audit: type=1400 audit(2000000071.520:52411): avc: denied { map } for pid=18396 comm="syz-executor.3" path="/root/syzkaller-testdir037906418/syzkaller.zIz4zn/89/file0" dev="sda1" ino=16880 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 03:34:31 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="412f66695865340e2cfdb523deb80d7f010e2815ff2cc32917e8e30df950b383c748bc057272ed3edc02d45ce11cad226c"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) [ 1095.472853] audit: type=1400 audit(2000000071.560:52412): avc: denied { map } for pid=18410 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1095.640350] audit: type=1400 audit(2000000071.560:52413): avc: denied { map } for pid=18410 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1095.740494] audit: type=1400 audit(2000000071.580:52414): avc: denied { map } for pid=18410 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1095.873370] audit: type=1400 audit(2000000071.590:52415): avc: denied { map } for pid=18410 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1096.029272] audit: type=1400 audit(2000000071.630:52416): avc: denied { map } for pid=18396 comm="syz-executor.3" path="/root/syzkaller-testdir037906418/syzkaller.zIz4zn/89/file0" dev="sda1" ino=16880 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1096.132091] audit: type=1400 audit(2000000071.660:52417): avc: denied { map } for pid=18410 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1096.230844] audit: type=1400 audit(2000000071.670:52418): avc: denied { map } for pid=18410 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:33 executing program 2: clone(0x23015000, 0x0, 0x0, 0x0, &(0x7f0000000180)="a0de925b340900c8b7b5a53a69912fab0cb346f6699b64996c84c99223b5c19e54974eb4ec92a3b0454ceb68c0e6f7410adc9f6facd3f795dfbc8d42a45c252a761a042ab2f86f4965c8d42d1239bf00644868dd927f34ca15bb4c70f5c4677f30ed8c8d0800000000000000ac1c60455a77c9545f12a29c882cc2fb5eef125c03e7137b74cca03b0b2c") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfd}, 0x1c}}, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0xffffffff00000000) write(r3, &(0x7f0000000540)="719c3087b4ab1824a1fb8ed82f3a213b6a885cb4b6241bf2b735b08502c09c588d6b852a3e8e555f6bcd427b0000000000009d94d5f68b9b1d4eaa02eba8c1a488b283cad2e1922a26cbb0212363fd32ac73b159d87fdd078f38752f05984bb21fa8183ee4ca1bca85fc2b26ac805900"/125, 0x1d0d9696) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) r4 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x102, 0x4, 0x0, 0xff, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x2}, 0xd00, 0x0, 0xf56f, 0x0, 0x200, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(0xffffffffffffffff) socket$inet6(0xa, 0x80002, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="250000000000000000000000e9b800"/44]}) fsetxattr$security_selinux(r5, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:dhcpc_exec_t:s0\x00', 0x22, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0xa00, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x4f36213db16b5b49}, {}, {0xfffffffffffffffe}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20, 0x33}, 0x0, @in6=@mcast2, 0x3505, 0x0, 0x0, 0x6, 0x0, 0xfffffffe}}, 0xe8) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r6, &(0x7f0000007e00), 0x400000000000058, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000300)='NET_DM\x00') creat(&(0x7f00000003c0)='./file0\x00', 0x100) 03:34:33 executing program 1: io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffff, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, 0xffffffffffffffff, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, 0xffffffffffffffff, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:33 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2504027, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e20, @empty}, {0x2, 0x4e24, @local}, 0x20, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)='nr0\x00', 0x467, 0x5, 0xff}) 03:34:33 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1100.803061] kauditd_printk_skb: 727 callbacks suppressed [ 1100.803067] audit: type=1400 audit(2000000077.150:53146): avc: denied { map } for pid=18705 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1100.836349] audit: type=1400 audit(2000000077.180:53147): avc: denied { map } for pid=18705 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.123566] audit: type=1400 audit(2000000077.470:53148): avc: denied { map } for pid=18706 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.160537] audit: type=1400 audit(2000000077.480:53149): avc: denied { map } for pid=18706 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:37 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:37 executing program 1: io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffff, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, 0xffffffffffffffff, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, 0xffffffffffffffff, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:37 executing program 0: r0 = socket$inet(0x10, 0x3, 0x20000000006) sendmmsg$sock(r0, &(0x7f0000003640)=[{{&(0x7f0000001300)=@rc={0x1f, {0xf5, 0x6, 0x40, 0x81, 0x8}, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000001580)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x90}}, {{&(0x7f0000001640)=@nfc={0x27, 0x0, 0x2, 0x2}, 0x80, &(0x7f0000001a80)=[{&(0x7f00000016c0)="7a84686f07635f3bf49c89835f46e711cedd6cd787264ada9f029b72a74fed4e65d48ce5dfe6bdf2c9ad3760015b10748904d412a8934fae3f9e5b991e9ac5c47b69c01afd42ced6027ef6d0ec65f1fae4cc54648201bcb8666577057c77ef98431e176f25315beb427430dec0cb1d41927e80c2234155a8f67e3f327fb5", 0x7e}, {&(0x7f00000017c0)="bc031193043d783d13bbbb40081cbee5695b19fa277e11bb2c17ab278652bf69ce73377cf38b4709c563", 0x2a}, {&(0x7f0000001800)="56b0faf406431c00b295c88843532b64c91aff0caa617f3dafd1281af8bfd31e4fdeea75faa79821c940e24de7d3222b81081b0f74b6a077d3c09a47ebe87283ca83320af63e752d17f4c653e0e3c2d87d81c4f6abc9cab0c7fa9054a3d290fc675ac1416b48b98b88bc49ab4b7c20b6697a3e501067015c5bf7b7490d14f659873f5b7ae40ad47f99e84dfd6ab8d7e31337e36333989291b65067ad9d2eda1d4a8bea48087e1dd1f83708695e2c1a1a2dacda54ed7207839a46a75ed59bd3b0a1f1d88c87eb47fb9cf4dd986609", 0xce}, {&(0x7f0000001900)="ccfed6de5a1d9e6eca41b0afa1b06587892419ab36a453f2710617ba10a3f59f480e8c008fff08cfea1247442ff4e0c53c78e76b8844485ba6efd7fc0ad68af2d8fc5924617d70af119b2065cdbebcfad62ce0b9a9811703284a1f8d64191f6a639de6ef7f0f08292c9f1d42835da68ac8ef2ddd512277fff90a74e6ee84e42b1971806fcbcb5b0dfdb1b81c8e1b22dad9923980af9ddd595a4a3e94412d2a1b022085", 0xa3}, {&(0x7f00000019c0)}, {&(0x7f0000000800)="3834dcbc66df5cb470af738bfbd6ff2ef4bd032244a5cb433840dfe8b5a4df5425f5b21855b5f7a510a31c6d0d9cff7149806fd67e0a1aa382d4304b703d373c2f94c37cbd3920e824bbf67c82f53beabd486148fb7b1ebb62327b589f2e1bbd120e650053469d89fe3ead1f481c26bf7b192164682ee6b6d121d3a0cdc850d92d77a4918800f3312ae4cb555e953a64bcb7b613ec5a6e589def79b7", 0x9c}], 0x6, &(0x7f0000001b00)=[@mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffffd}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x90}}, {{&(0x7f0000001bc0)=@sco={0x1f, {0x81, 0x5, 0x7f, 0x7, 0x5}}, 0x80, &(0x7f0000001d80)=[{0x0}, {&(0x7f0000001d40)="d1d7f01fc7fd6277f89b7337b5a86c08db2bf74f8219f7fbd0143926e5dc53", 0x1f}], 0x2, &(0x7f0000001dc0)=[@txtime={{0x18, 0x1, 0x3d, 0xc26}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x90}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000002500)="48fc48b32e32a21bbd9c75d109f55c8d3e8489881049d8a59e84db354eca1072b546bb5054aeb78bf7b368183eb83f5147a95b5a15bab986c996d5fc4f3c5acad3c091d974ffa156f4cd4b7ceff28ba66daa0d1ef3ddba0d90b9c8968dfafebd64be054413384ab6e68eb6a63707dc66df424498f4beaef9ee4dfe0516a29068ada75cb72f578ef0841de9a4214f", 0x8e}, {&(0x7f00000025c0)="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", 0x7fc}], 0x2, &(0x7f0000003600)=[@txtime={{0x18}}], 0x18}}], 0x4, 0x20000) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x20000000006) r1 = perf_event_open(&(0x7f0000001240)={0x0, 0x70, 0x6, 0x4, 0x6, 0x0, 0x0, 0x0, 0x2c0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_config_ext={0xd96, 0x3ff}, 0x1100, 0x0, 0x4, 0x7, 0x3, 0x6, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/full\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000a40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x44, r3, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fff}]}, 0x44}, 0x1, 0x0, 0x0, 0x20041844}, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x80, 0x6, 0x9b, 0x7, 0x0, 0x1, 0x9, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x10000, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x3, r1, 0x9) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) sendfile(r5, r6, 0x0, 0xa195) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0xc}, 0x6, 0x1, 0x0, 0x4, 0x8}, &(0x7f0000000240)=0x20) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000100)={'veth1_to_hsr\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="370000001d00000007c0b45308ace4b860ad769000010000000700430000000900000004000000"]}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) gettid() 03:34:37 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1101.204086] audit: type=1400 audit(2000000077.530:53150): avc: denied { map } for pid=18707 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.228034] audit: type=1400 audit(2000000077.530:53151): avc: denied { map } for pid=18707 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:37 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) sendto(r0, &(0x7f0000000100)="b9db", 0x2, 0x8800, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f0000000300)='debug_want_extra_isize', 0x16, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x666d) sendfile(r4, r5, 0x0, 0xa195) r6 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r7 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r6, &(0x7f0000000600)="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", 0x200) sendfile(r6, r7, 0x0, 0x666d) sendfile(r6, r7, 0x0, 0xa195) r8 = dup3(r4, r7, 0x80000) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x4) connect$inet6(r8, &(0x7f00000001c0)={0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x1c) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) r9 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x222401, 0x80) ioctl$FITRIM(r9, 0xc0185879, &(0x7f00000000c0)={0x7, 0x9, 0x7}) 03:34:37 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)={0xfffffffd, 0xffffffff, 0xfffffffd, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc56}) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000300)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x9}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0xce20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x5c538528a7177132, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="2ce05ac02c40121f2f73d7", 0xb, 0xfffffffffffffffb) add_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000780)="5bc4f243600b2f4ae044de98e0582a0900b05a871a0849e13c37b304", 0x1c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) [ 1101.263628] audit: type=1400 audit(2000000077.540:53152): avc: denied { map } for pid=18707 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.337480] audit: type=1400 audit(2000000077.540:53153): avc: denied { map } for pid=18707 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.370938] audit: type=1400 audit(2000000077.540:53154): avc: denied { map } for pid=18707 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.398202] audit: type=1400 audit(2000000077.710:53155): avc: denied { create } for pid=18710 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:34:37 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:37 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1101.454363] EXT4-fs (sda1): required extra inode space not available [ 1101.463030] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:34:37 executing program 1: io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffff, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, 0xffffffffffffffff, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, 0xffffffffffffffff, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:38 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(0x0, 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:38 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x126032, &(0x7f00000000c0)={[], [{@euid_gt={'euid>', r1}}, {@mask={'mask', 0x3d, '\x00\x00\x00\x00\x00\x00muv'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}, {@smackfshat={'smackfshat'}}]}) 03:34:38 executing program 0: 03:34:38 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:38 executing program 2: 03:34:39 executing program 0: 03:34:39 executing program 3: r0 = dup(0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') r2 = gettid() tkill(r2, 0x40020000000c) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) accept$inet6(r3, &(0x7f0000000f40)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000f80)=0x1c) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r7, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000080)=0xffffffffffffff30) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000480)=0x0) r11 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r12 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r11, &(0x7f00000009c0)="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", 0x218) sendfile(r11, r12, 0x0, 0x666d) sendfile(r11, r12, 0x0, 0xa195) r13 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r14 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r13, &(0x7f0000000600)="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", 0x200) sendfile(r13, r14, 0x0, 0x666d) sendfile(r13, r14, 0x0, 0xa195) ioctl$KDENABIO(r13, 0x4b36) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)=0x0) r16 = gettid() tkill(r16, 0x40020000000c) r17 = getpgrp(r16) r18 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x1) r19 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r18, &(0x7f0000000600)="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", 0x200) sendfile(r18, r19, 0x0, 0x666d) sendfile(r18, r19, 0x0, 0xa195) r20 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r21 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r20, &(0x7f0000000600)="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", 0x200) sendfile(r20, r21, 0x0, 0x666d) sendfile(r20, r21, 0x0, 0xa195) r22 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r23 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r22, &(0x7f0000000600)="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", 0x200) sendfile(r22, r23, 0x0, 0x666d) sendfile(r22, r23, 0x0, 0xa195) sendmsg$netlink(r1, &(0x7f0000000980)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0xfabd38ea28e4c0c4}, 0xc, &(0x7f0000000900)=[{&(0x7f0000007e80)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYRES32, @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\b\x00m\x00', @ANYRES32, @ANYRESHEX=r22], 0x7}, {&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1}, {&(0x7f0000003780)=ANY=[@ANYRESOCT], 0x1}, {&(0x7f00000047c0)={0x266c, 0x19, 0x200, 0x70bd29, 0x25dfdbfc, "", [@typed={0x8, 0x6e, @pid=r10}, @nested={0x10b0, 0x3, [@typed={0x8, 0x66, @fd=r12}, @generic="9a793cfe2c9ecefbf4cc", @typed={0x8, 0x46, @pid=r15}, @generic="08f44262c405734cf6d189165aaf0703800b5fcd2abe58f769923f3e0c6f73d156d868f918c20ae91e37d9ba2588bb63035ba2f831b73e1f362f5116db7506b0c8e44f4a36cce999ab334004fc1abd30fa7412d33f01e42fa652b1068ed2dc2d64a06976d6029595e0a51f9ef366f7c3259eea7d5a540f2d0ebbb869a81da8be005220568447ccdf307874a56c3d950d", @generic="946d0974f82e95a8b85c5309e8238912f72a3f4a302577ee9a591dcce9a19968f280c489bd47249c253e897651c5bf3e3bda06f542a3a6c7e5f2405df2656296e7ce23b24be5656afca82454f0f8d8a9a7f6e9aaf6ec2547cf558491b05cb62072cf75a57b0c283719aac4b5c54464da9f9555f5ec852d6672dda27705f4e87e46fd64ff39e151f647a260d530d5b7752cd2892158c22f899319df09524565f7da2611c90aef8043dd9b0f9878fbb1985c4096bb50f0a0de10c32727ca7a7452e1136a365d32f3c2b5bb54ab1626cb99bb539770545d7b281d43da077891ab309e3ee46c8590f70e69e22ea292104f8b06d544a656df1c2319a200b673447664b0ad805363fa0484f34adb18d0f0b2a9dc5c8f783309a218341c68939e53b6345a869bd49eff04b36c67cddb78983b3f73b3857fe9638e64fdafb8e9dd7b110aca2b0c837dcef0621733c0d41872788c73c02a5842d6d47f0b617d7b12a9e46241bc635e6903895ccae60d713fe031923f84391182953cd2e17e2452e4810326b5d2aa7c275de8471e4727038e718547ec3406cf6701008c1888c0d1005270f38e683683c048de185aa716e9a3cb81632378f40cbdd7c4680479a22f4e82bffdb357ec2c81979f957bf254b830bfbcd717e786b62d2fbb091c64c3582b218699c47aac8ed9e69cba358db6ac5e51f9a5496048cd8bbd69b134f29d91a5edb248bdbe1463dd853033fe8ea9b17f5794c19a7c9719fe963b08800e070c13440386e9dd40be1f86baa9a606f895f73ebd2c0a5d1b30b4441fa2a7d25e90011783b99ac7c3b38ea41cf80c1a5777e92f9c688f12f7ebb3f64395ce55c8cd363fc90df97d352287d77e8ddb5f6b659e9cbbdb8d81069384e1f123b6e7b2f713d8492412030df658a63162106af47517a3c03e01bbc7ec1fce25cd3a5ea41969f0076d1610e751b5cd6cfd353cddb0cad9fb18e977132d70e590ad6ddf38c7465aecf433991e7018e50ede13c92f6874b35d5e92094cd8b2aefe12731e6a5aac183e03d47be6c0977f2503ac7c39f42de397b26b4e9c0450086f2fd3149609f2c348d3cb5a2952bc0b00474d448b168c57860e89547964537d6341f726b5742bf3aa75d404b3f44cf258f0c4d5b91e32deddbeda804d941b9bafd8ec800e7127a36f5b6aeecaa1c0ab538884d575f1a051a3898fde6e1a92abc7359b0dd1cabb60944d150f655ae6b87b37e0aa6d99bee9e9a56988f5692c2aefb2aa43f209b954d016612855a59388945d8a83c32b904f18bcd89882f75ae70b2f11c953d2f129ad8b6a0d3f45bb0f303d01fa32bd8ce27d7b2d406929278a4c775eb2b8f05aae3b3dd44dd67c30f9425a937b5177a778ec2b786caba00555b8f05c371b13ea78da13303c8574369af51c599a21f9cb32602b37da4b4dc1980b3e8c6c4e39469ed6251aa2d15c4d2e21cad7eafe39d573276c4cc066e62a817405c0ef74d9994b5439667581fafcf313df344cdfe534e8cac15c5bbbe02308fc7554872de540b877a239860f267bb855e465a32d6cc22048b8bcb2bc555e2a5d887a22661bde53996048a3414ba0c3dec6c345be502250222fcaad2963f121c1fc46e7b680dec170d282aa4715efe6d395b9a2d9e9477781da737d5809eab22a3c30e914c4421308b2849c4b119c76e0174a68403d028d913d9d62f9f23cffa5ff92cac869fd55ef76f86263f001a61828d7c918568c158ac8bedbe05a5e211df84146726550f09cfe2f8663034637b7c95b51ad33b7aab7dbcff829a4435b68307bfeb48be9d39f763b1f2c011a2e96417b6a1d181242b6c09c2dcf4142dddc8faa10b14493c1685b056a307fcc386087ceef58e88df6aae743b34e33a9fa0587fd9fa68cfe72eb9f3d431c535f490ba8f28e7b5ac8d76ae3f0d58b5f2feae729f9fcad1f300bf41413e50579615f71aacc0538f372656122b5c20795c80405d6ed79b9ea43ccc6f7347da176564a1285d1ff06e85ebb804a53d03f62b19fbfc016c714018db7d3ebc93d1f19b53d3baf11a5dab516e59d9791f2b6debc63ab7b241b33fc9e96dba74c02bddfabb73685aaff638653e7fa59ffeecc8f1bf058c26ccad3d1ab5c2cecf1138174e3f27fa77c057102b468ad7497b27dbdeb5166c893ae239e5c653521e90e3de5b47498692aadbc406d664fcdb6a449538b67a6f4f4335a77c74e7f8a0d73aaff3b8537700afb8759bc80ede0c7b00a36d48529bdbfe90342616809da23c82784ce9f175f221f9872be5e9d237a8991ddeb6b87981440c7c2f89efc8585c132d88e51b4bf14f7358393587741d57acc2ffbd564329a41dfd13ec79ec89836bd0388dce33922cc5feed30e8e2252ef5ec47e52bf660dfee546a1d65eb9d062f7ba1a068424644334d722d66f8f9e86937e4413c6b6d178c1b908b046e53bd23e56a19a2a6ec1e36b554dc0c5a5547666ae016cb37d6d60804148c3ba7d044704bc75ef86126546b31a482d369f6a491d6b260d2fb09190cab416bd1a3111e2c31934cb69b031d3ec252ceea2d384e2017ae45a742a33f217b9955ddd48301a954af9a3907dbe0c8ae68d52173e66eecd0820587e79b67d60d84a587e1d662ab4516d8b4e840e6c1cbaed1844d8d34d6d6be036cf925ed6aa82465ed5d943a68bac0b82ac03023259da04af5f99b3540375b56be05ecfc53bc945fbb37cab06f998685c5d3222f22a6dc7e9aee27be76a66fe8e63e0d8c9585d60beadcc666f42be0e8afab1f48859ad1e0cb94e8f5cc227a502307d20126364e216ea8375a4fff4ddb5be92bb0a6b331e6ad3fca74268065aa67117e77aceaf2213b7f923f5ecbdf813f1847d7349dffdc80d0d4e43a9b55b34af9cda794741d21c1800dd8963d2a962bd40566c46e09ab355ab24c7c17f7ddf478ecb64d08bbb0795efd641c1ac311be01e2a97796aa090b6dd37fca9b03a5266fc4791dd3642b93f0851e762b0fba0fffa7f287f1540f7cd16d0e4e89fa3d454e133310a791f22392de6103222e079a0fa401a1618e9952c8b7d8cf91713b276a0365da92128843a6c0c5d533efaeddbea5a571ff84933dc7a2db53cce1e91191c1c25358bd5d1c3d2aba36c380516ee8500713c17bcfee22856f74c2e2a96220ff2bc4b524c1a913e0fc13451785ac144745695f6bd5958c0fd41d4fbc941e858d49bdbaafbbd326c326446f1e23ee094e44669a1bdb1350ae981ba6b0fb87afe8362baeab55b82de7045fec4bcdf5914e00e50691741abb7867008a7e66f188eb917254e90e098907e621e621aa84e087136ba1d4c81acea653defc318e5984d7faad9c12d5a0dbb243bb81f9fc064cb43fbac26637959a9526f5289be2a50918b49dc96d25b29dff993fe1c6b0c8485b51f563667c1f6bd10e78b177c54a4d4ec57d3ac75c7de5ca612d6f2bba42f35adc14337733fc2a05ada66749679679267bb2f6951c85042a5e107aa5a6c16278839df22a319aa9720180f4c6fd5a94c5baaf3827691d725cee1a358b0d79924414b964f01acb445931337e9bd58b9910ab01fdaf270d503c6f7da3c5726740a4bfe09a393aa9fad539dcb457f461eb95d3ca4c9606b7e9c792c40c9f5096a6e87dd10d8f76faa123a336ca4c6ec5c7a264473328001c5205c8665e55da402d498254b44b864dd40d3e76979098cbf368240e6dd30037bcfe052fae8d6096a15c1c889d78a3a685bffcef014544f5d3f458a3c7e437c7a3733b541fceb7b6ba6fdd129764927074da6ba137bfcb29a50ea86ab123efdb0ccffd293bc325d72ce6b66c1743c2ca515594fc2114521a176c78bf786f0b3481487bd8b61149673e6bae7d170611fde20278e81aa7fae4e495992b2fe45dd4790a8523befc60fcfe96772c2dd18a21d55b1c7f8b70a2778cf81eb6cbed43b18c1a3e65131d7994313e829a9690dceeb03b903c5f8ce7042902f8089de75577c4a51bfd5d15b6dcb1e2a995460c84393d493c65a6a5f17195c2bd22f5cf389aebad46e84e5fe8831d1d1bc3b308bd8c2c26230812f2745fcd66f74d04601ead00fa519d84cb7e920a47debe1a38e660e64519bbe09a15008ed787cb33f330d18d8a1fd92acf3ae633e4e95f453c0ee3400a83b5c286b030a25be2220ba57e2b785b0c51c2e234aba0c87a4a4f794ebe71609ee95aca1cbaaf1794528efcf4ae7ca50126f61d2aaece47274b25b004a5d9a83da464a8c6527ff2f977da3cb8afed7b425aaecb703340368b0c91abf3b9b5778336ab7436ae3bc413a1f38a4f6fec36788bab35b3a5d2591c523e0fe96dc739c095ae7aa3e2baacf1892fa315e1191e4c0ae2065e498cbca0ea22df81fee9c63600c44a604ba27c91e1ccaf19f6862b6371f0b42f83c5ba8c2223109a7ce41cd0b58413db7193b82f1962da161dc88b93c6dd9559c4f47d4791763f0a19823ad715e5792d6a37ee022b5420f0c0388909264b3130bbf90cb8854abafdd1f520b0ea2599950288a82c1c87455850f90870d21b9cc6dd8a34a0966d81e34238b6d193e26bbe3813d4c6d81d5fa0fbbc86903d76bb60ce06cba031cb32a37a6e6984126c4b130e9316faef2f5d77a81904fc5d632c6f80c24d1590dc7cbd2d8a491c8a0a79f51541e8a13c3081870079a290cef9c14b5394e2203af5b64490c58132a9a00d5fcb124b0884b149446aa6331286b6f7d1e25e692a088f319107e381f666b2dceb32df15d7c0de70b3faf97ef9f4fd25376ed219a8cfb356c0ef41a2aafef2a33bac8be461580f66d216971281e3c2fda80cb02642b5aa4fc8c64958b7e353b4a982d7fc75e578cbb6deceae38242bac55df5ce1835827d86a3e1964febfdc3ca2c68ea63fae548345d97f3c190f3a0e1ca22fa46bdf2544d174871c0093c49fec84448171a5068c3ef44c8a44565f510dc87ff292e11103b09740c63270d78bbbef958e96e434fc0421047e42bee1972146e37c76302b3e30b7b29ccabed4236d01dca47f21365a98358886aaef7c4f2595edbc22e0a57f300861189beb89167bfa7b2944bf27fa64c145c6a828c6caac1e1239862e34c5ef1e02e3e7872f7d5a51e547e0f44537e17e7335dca53223103b796a22797cd22a69728ca5956923d36322e5cb9c4a02b6bd25ca3e4634a6490df598369f67f8d4995057b8306e76e062b9b1af7268c020d1e49563a9e9a20e263f78d6a8c50acaa0a504aefc7e9be8085beec35ff741dee0598ce6ef63fbb068810ac852ceef0029f64ff19d23158fb05a5ebddeb94b6299f01ae2de292e54e1019c12f7e41095c12f139039cf8ccb35a6821de71201d3f91059fc7da21847a4fc5e13e19f22de0951c568684886a9b9ff1f990d85739f39b0236ee64b9af0e7367d3aeca3299cc0ec5a2a8d5b2a77396aa4844030567aec8f01561296f9d482c61b6b0fe1cb64c32ac9e90473d9c93f350d28b57bbc6df822ff314aa38f0e1caf0ad8cd60f2656bc79fcfe71f274852141aa652faf3d2a41c034baf66b48768555310c1429ea37c3e5873de4384716b490e2cf7e8ac638adc62de6f2830693edbd3ba3eb409c81463db0c2676d4d4dd4c1739b5197905b41faef99c21b5faca11f4be86a6c8312092f47bd9929f984c5ce262d7c9a105974c7833c49adb224fe6ad14682e7211abf2b80e3692c2b12cdd87719bc3aaef546f6747cbd6256c181739da35cf7c4fed5e1f09c8ba54eed65b2c0c6864d50c4d457ac492766528c95e5aeece4256e81645c0c73376382f4568b8224178e21de95b3"]}, @typed={0x8, 0x59, @uid=0xee01}, @generic="e52e97a115d0f900bf5fc79417d88daab9520bcbbbb4d43f3bc641084fdbe056e1090dab12e2c1f17f927fdf2728f3c3644bd260e46fb5bc22afc43ccb7eed4b5e2bef2919a0248bbb75fe942e6813aa8ffa28394df2c61bdc7ba666eb3ea0dec82924e86bcd7ff76a5884b5a40803e4997105e476e90b68743e27840c53452cff5191dbfed80f8995d7556ead14aa08febad9dd48381cad09e3a55fef4a8923b8b3ddbf1862f7d284f53f6415651f7d890f8f095b42046968e4b94591e53b657ce2db806ea89d1879e5c997a450e7dc47acd6fd1238ecb47650", @nested={0x268, 0x7d, [@generic="c39a819a4f0e821289ee051db2920d17ba006520eb34cfceb6a7006a99e997949e4a7a717ea1e05af3f1445e607d5c8253e9ec2d9ff5e3ea9e5d151454f1fcc54b8c2c782e62443f3d409a06f07d757fc0adf38b4ca14482cffda66bd8e27da92872bb23d077b5512ca85ce9a65851dfca9e404208a7ab33beaf514723ee790cd9", @generic="bbfdd65900e9d9cea9f31595f7a38f1dc115feb1a37af5591e92468edc18baa69f7fe7b8c64ab17476d7e70d0aed3973cd9b3bf5ebf9e34f146f69bf18b6a67341916c8cd63d0d2a4ba19bfbbc4d376f063b7d14d7cd8dcbd7e4517df6939bf9c426b3342ba856c42884facb5612099b8beff9df61e911d6cb71a5243fb486c4cfc5b7ad0fba2b2da460c303c74581a2b50e3a02f5f21b312f7f6a8531763a1416322a444b740a572c1a5d3537fa413e705482d1f77f97924bc52f1c48da373df2744c8f34c5c467a1ead7abb230b29af992be50b275a31cfa4608f7a3d83b1569e1", @generic="6ee3359a4ba156037cb2caff8ca3cc74068e8a81476d22d9ca5d9f099cbf83c06868a353eea92de018854823c44cb13a56cbe3dc5505f756e923229ca13c26a566de412b7f77b643993b696bdb4b66a612a8dd649ff1873195a8ae7162c9a3099688dd784ebc5c863493211aa77cab2db405364f330c687bb3b88ff3bbdf8517bc67fed0bb5a3a885f08da", @typed={0x8, 0x1d, @pid=r17}, @generic="52f65817264f2e178abfd6b424b4df89bf042cbfe27d108b3cd43a2b7a010cbd3b09cd23819d760f5ac0890c626bcc9d16745aa459545655d91a8533f6aad9415f00b0ac39d1c0913b84c39032ebc01a", @typed={0x14, 0x91, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}}, @typed={0x8, 0x52, @uid=r9}]}, @generic="ab4e9e98e37f301449a7c5c053ecbcb8f41181800bfbaa837246c7f6758b84b38ca337023bec9710cf333eda991ca88ff0c5dca1d23dd2ad10a507f25bd24977b863ddfadb24946e7f06deac331e94fde93933b12e8e4021d0c16ad41705c195d2786dfba360be462b35fa381c99f6dac5ecb2d2f781c6ae213c91807bd61e06", @typed={0x8, 0x32, @u32=0x6}, @nested={0x100, 0x6b, [@typed={0xf0, 0x1c, @binary="c47b6a6ded1f5e13e385e50f9a8e55ae03dba8392c9098e72d8c7bb7469f544ac4b13760c47ec78c0a027a870d323f177c57b46ef6df279dd558582a1e2e576828907a846e46c8f16fb665e8989076091e04b11b79b33df1a746621ed09afa11ba6ab2425327b738cb07c0f848087e7b602b89125aed64428d44c8693c10c8cf8dccd14170de92149f322c24b263a2d31859e6ed0b30772c19db4ecffec3dfd3101c7010ace37b57d58d1139b6509cd167e81a10935ff0e20f3f673ae275203f0c30e6ae6615215749bc58fc125bb2d2e25eb2a279c42de7b4999aeb05181fbe2c6dc4b9e378e65cc1c099ee"}, @generic="2835982e", @typed={0x8, 0x9, @ipv4=@rand_addr=0x3f}]}, @generic="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", @generic="2040f56940af1d921f79d680b47e99c8f1b6fdd0578c3f74969e6eb7aef4733ecf460ae6f9f9c4e6a3cc4c88bb59ae2b3f1eb6e126718546ac51a6e6ff360245c608119310f7243a3b6ffb4f272763ee8a04953c6f63cb2b333d1477d6ae0b878edb2484ba3f51d47fd7e1a93b8bdd258db60875faf502f30c7a8ba614cf7ef27ee3ff1e528ad7a2ba47237746f4136f9664af815df744b025365e4f97cf1d9f4bc3719f64eb0ec0fec89120c6693992a1c05005ea6b17152b7fc1c58e56cc9002ad4f11a4bce9f94c9030d60181a0"]}, 0x266c}, {&(0x7f0000006e40)={0x101c, 0x18, 0x8, 0x70bd25, 0x25dfdbfe, "", [@nested={0x100c, 0x11, [@generic="5288eaf3f3053a38cf666614c9bac4a67f849df52b7e1f0fb27111aa267655a6e3783e1da1c4cb69e895d32013a44b977ec4a034754848fff082fd7ce2f3fed6df7990de05694a56b518b5954c91f7fe97e546d9fcf3a3342daeb5c179a91132af2c3974a2a05e081ed82f323bd458f88b349d5aeca605ae41ee8207e83f3bce0074d0118b89222d50c7dd6a725b0f1a665d66827d6767af72e1b3191262cf002c17715286e5edd2134a13bd25a25e855ea5276d52db85546a0b4a83a69365bdab9738ab7a8c4d8e29c3e9c8449efc3f5b098ac301233f4b7be59e7fff34d02c25628e177dfb6a78636c07bc724ad95af3fc0945acc2de0aaac7145bcfd1e2f7412a0010c07443b2c361d6462e249be41364caee1b0e9cfb7b1244d02f0cef578570dc47e374e07a9ec31e432a66a13a1dcfab9100cd4c8b4f8fd5b1ce8e08f6e57f877733a4f0394d965b955e9427883b060c5d1bef0eb053ae00f321675a53eee7ec16f93ce90c74dccb47e0f38091e62ec60265599e2f60ab17a4c8da4310a680a7db2932b0eba83ab369aab58bc38a5923fb51aa3f0354c14d2416c301f5199c60ac488579fac06a05ee55825d1f27547b60dd8a7b294176153ff063b7d65b0cb0affb2eff090faa5c1f027e750ff836755d383195c3891ec5ddd4bf2aa3542a887d42e4225d9d06bc403a475848721a75fdade1aaebd65ab0b8e1a8a928f1c219a9916f347e6f96d5d559976202bdab6393b181c4499d2f79eb71aee6607369315bf1c85dada038fc3d1cc03cc5590711ba2079234f9da2df5af4c264e355654cbfa5d43c17c3d8efe4023181e3049de7675c421520d57a657b375971791125f900635528dd17b9c3caaee50edad78bdc1894194c9b7d8586f1be3699630a244b67c631c286c433cb2b491471c2d546b51c237132a16ea5b7955da98c6b3c1a3828659b00f51b0a5799b50ec199db60755da0ebbaa6a9752b7f9866b40c4c61c81e003c92990271a85113495b430af9669c5500dd41f891b2455e3e4c7683c84800e75a5fe58b66893738e4da9101bbad05e5a994943f5120cfa209478460e46dfce39ab4bd36e918d65b402e07cd19306c8417c49f89ba197b68be550e9af656de1fff0fee0c86f7be8a6eed416afd2d327e3014d9923eb8fc72eded6228e71e8eb68af286bba55f52a4cd1d57e05eabf98283dfe6dfd733bfb6e428c20e05ada7db9ff5d982abc194a0d33d84dedc14140eff51a3f05b89f3d69d3d934ab3d3c08c7593ea5f9cc9b1586071b732b5b54b3513bd121699e59aba520a57425dbde8c114ab7f37c93a162a8431c87149785318734c54a31cfe78011061b081c7776f9a89f82e8274bd0c7218f89b3b12632e779e6cf2441916702b575a02c3b2d490cf06ec857cabfb5cfaea01d6cfa6c399aa265db3a7d88a9ffa3adaf42e6167f58b5ea454ff4540755100286fd9dc454b865ec4f5344b28083a13168a147ec82b9b8321d349e6d91cf9decd4d450f548e0fb4c2980dd263cc7db511426cf27b7017a18eb1df4f7ef243ca35607c9ee4cc706176c8e16c5e41fa4df50e1afa073c68b6024e7db4ad8c5719e7e66e71985f29a0e99208fc9733428634b0ee0f3705dd6cacf1dcec99a6b31363969b5b6ef33ab0c4318d3ff6bd74bc43c61d7f745a20712b80eb067ee7cb3b350ff429c4192bd73580f99d44726f9bfe43ee6a49dba94051630d66e7ac5d0fea393c5ee00c89e62575b409667c430c7b02c0867a2a603a25312610455f859d19304878cff80201a75a2b3341580687563ef008cf2935ab1b79befe7240aebcd3b654a3be08e145054dc92ac4d8dc060d75d0a2fa458718f7c667dc9d3c51965621837b1b1e2c79c41965fb2b385a465451168d103be96e9a4eff96099cb1584613fd19f86019ab36cd03ff1e21fc8b4f9644ea9ac866241facb1f943b9812955c3274a678b532d558b089630154bac2782dcc450b85e398ef61900ba21a130c79eae1b42b536f1463e2f94e80b94a0758b7ebaea257e2c3680d7ed919a8b91142324c878f6de00580a581ec535ccf4fe4315a2d09fb921b0b72bbb31e445ac20dd1f027f58dafbe341bf9759be499ba334ec0f1e6d811cd185117ebabedcb4c3aeb775d2af3e1d4d3bcb0baa00b290f45b8d0661900cad80df2365496bdd384fc787695ce79c82ffbf96bc777350106d557ecc135891d97487c2873636f0d4a2488734d072e4f40b3ce07d4dc993ac981ad3570cea2419ff40c5615826235c1c24f8da27bb61472241268a3604d68c4c7474640f83bebeff35124375702125fa2872893520262b1a53f8da017dcc98b36942f076020f74019f72e2b32af419fa6c9230535f6d21d29bc87dcd38d7b3723491298c5956c4a3268dae862cd6ca00f22a63865b86f4f517ec352e8ce8809f2e1e2c04e1ade04ed5bf05ab1c4eb4da6cb5ae02fa40a3b4b9b3c2ee746b795d0eed56085cc586edc02d593e0dd1ad313f905b03581d464e5fc4083c2f7b207ae02d2cd0f320699e38414af3763be79fe98451208c68412d7a7d68d8b907dc7b3d32d1440527ede60c257d68d5833a49a9b35ed89c3fb74f2991290379436bd762cf015f31ad0925324c26ddd366acdce192a24f0eebcc732a7406ba5fae799b0d2cc7035d667dc0e14099cbe4c0aa42a118336df0c9c30cc95fd61b51762e9acbca6ccfbc391df181309516531323b936e55d0ea37cd48e679b9d1a0e71486a10faa26b3dce086fd132d1197f901dc66f4e8989a5048c91a626acd082b7256045dcc52bed7fa5a0a7102feeafb53e44c77885b8580f036c576cf01bf7c87536b73106666033cf99cdba6ee490a432180b2a2f0c3e4e0bc51d541665d2ae4739b0f97b80818553c6254c55a2c7c08f449fa8a522aff37874f656067fbf6b392bb58c55f1d9ad18f95935af4d1d6627ba9a40b1291e010b2ea6a47e3cb270276f36b9d1cb59b9103c61a84ce7e02e071a8ed8a1b19d4efa45f03ef6268f635a0769e7f3335cbb6cac9790be729897fd40237688afa0e0653c569db70d1bf42dffc06d2b8cfeca3d4bcf51960d0c26187721ff9bdfb4b1455ad2ff7d5ea900ac3d8d8ef14733bc7b1554c8f4c43d6b8d6c62eb215dcd84f149965c68d5ef0cdc913bd45d0d486404c2a4ea9b1cf2a8b14ed2cf11e6511899f8988212adbb4769a887b7ef87c7cd10a2de391f1b0f10c3e2c8e78566d482056b614a88a6bb441767a935b6886203f13153ccdb423b9daf3963137fd607757b6bb35a7ae28b485fbd62cbad87cf90414e33fc0222cd7445a6e1638e4f317c61d2ac1b2423b897c335a7f1480deea5eecb5cffe28c0d5fa2660091bc2ae8a0076f0169e57b6300a8e847bba894d206ec32863a316d617703448bbb07809b9ee9e629ff68777974133b72f4ba8ed68ec67262d4068c90563ed7b21f45c8cbb61966dcf855105178fd7b46235fcc8cbdd678a6f8dc50c555dc8dd02fdeff330030a5895b835372b6069a992aee7fc44b45d28a2f274c96994e7da96e414ed60b70ce217a06ed9320427d183f9ece206f0a1b292e9866c1de019f8de4c692049b5b783e7c542e8c577ad3dc6b52c234dcf2d79d32640837d80b86b533be5c8def949857009c5ef961fdf415293e6c56ac16237be3492a98c98d2736e7830596d3fd99ba2417f9eb43aafcd7e7caef8200152f8d1a00b5c8ebafcf60d6fd875bfa6b0b207365b53a5599525f7b123daf3c662cbb570cad3bf2454790eddd58874a7ae3898cbaf1d89ba3b8d0e0ace12db497421cd94c86dda02fad7b241ed98fe2bc6d16e110b8fdb8c6749084ea9f82dbf37b0f29e0353e58928c53e7d4fc1b8702c7b69d1e6bb4205d4675c4633bbba0acc73647cd1beb70f7291121d98f5f29889c6f423d4341c4980febd5fa401813573f20b8881214ac98637db41f527f65c9dc1aa68d41666d1c8e2e7e2cfa4e7fb0af40324192991ac4ddbefdc920462626883305085314136a475b134006c092b13883f31c8e06abafd0c4260f9085f0a5afa58e900471017114df256f4ad2a676dbd3da3f2709ae2573e45c4e9e72886b777a15c1bbf9df525905165f608a4d2cbfd7fbb5a053e98efd65df5219b32ba71a87353997f59bb0a7123e74ade8c999aedf8caf88651e41841c5f30de5e8f87445e40fc051da1d6d69ec4320c7f7dae196df96d1e189f1ec6064daed33f894af4e4f4a44336e640d947fc7ca60207b98902e70a80e2b764e8017c44fed9a586d6c69ebf4690feab6a1ecbafb01d269bea7076cfcd9a809b4b2e309ec6f7327a343875c8d98a1127de86dc81ac1055dd70d5f6f7529742fbecbe0c7e60fb7e253a0ac386b3499fb55d08ad7d8d6b8cf8b0b85b529eed639114b59c6116123161d3b389e0b0af4828c71062f42fff8f0bcede3df552e372a1fef9a6b873e62e1eb4582808cc7f848201df361e827a645f08aade1df8940566088cc373ed501fe583bf7459af0151dea326a44ba8c6c94e23fdd05fd16183c2e78e96440a80e56354d2f7859bcb101b196ce64eb2de74bf145f5ef5c5f0cc7136ac9c4b8d07eb89ce8cd2afa773b1f17e42188a5e0fa6b6064bf0a1e0367b2ed1c7255404f17deb4316bcd9e31c856f35c9ae5e72b371e7a2af13259de7bfac278e3ca53f92da93b2cc812ecc8560f42ccf19d020a1ebad8a5d18ab07321d9e7ac65bd89c33131c940df462ab72f48970b021473a00a8465b81d8df712441c9c67fe13cdcb6f32868f3f59f936385727ce9b0dd7a2a6a71818b3c9cf55c47aba57c2fb57395c96b26756b7f5bbfff01cf7d25a106f397de5fe799bba2e6446241ffa85765a9a0ed930eb232320cff4cc11bccca337f01586877dc02605ab021a2c93534d0996b79f3b18ed5d1d2d298a20dfee116b1f6c1362f111f8f49f184ff75ba84c03b4aeb392a201aefa44325764d0cfcd6db33ab61c94272029101ae565d95323e89b6c03e3b8587977be723410f3bd33cce8b2bcacfc5443f015e0a8c94f98cbc023ab545e3ac18423ebe954bebc04925bd41f300ac39a0476ba426fb797dec0faaebdf927e025ce1ee72f6e6764302dba4ed9c1e7c18754563d7dd8aedf42021df867f0cfa411e6f6fd0abe8922f92590352de99dec2c33913fed1a1ad8876d4aca59ea9f75416270683263281fddbc6c97239411d6dbd169ebbebbfdcfc859c8518d1e9236d4d04429ba16aee7c35c2f1a251a6ef60511f959d13025e7ce3dd65e1d50cf2588cb1a882783205bd643460a43a5731a6e0b94474d19148c571c745d0ab1a5f38dd9e13cbf26336943dff259a5395184819aff50a4bb13ac0f94cf6c1b76bd523f174536fa5d4fba93ef807d7d9be0f9b56e91a3eceb2d75446542231dffdc2556010501c777772e3ac6b30c14e15a4d971090fb0f442e7374e5110460f80d25ce114f85c22691404dbfbb561f12b821fe2925d1c43be0cca47f3588f30b2db55fb91cad30ca7394b66d392c7292f201fde062e1bf73a25376e25339605aa1b0d8f4999082ba0ba7da818bf5a2ffcc2a25b4844a5fded8e5a990fd9e50647357f18300b272b9ce024368544cb7453c102de72460c61204c2b59ecb51a0b449b8ef4b4a5081afcb33bf60e47d66361498e4de8f95428f462bb31f9fecccbafc2b002a0b845444fb6e9cc655f233092b41adac4e2760cf20b8dfae79f122e61474b7a25ae41cb677e05f4794e4e2a2e47d7844c2475126e0a2f7ad76481cb8b4ce46d29bbb3e0dcb0", @typed={0x8, 0x2e, @pid}]}]}, 0x101c}, {&(0x7f0000000500)={0x10, 0x22, 0x400, 0x70bd2a, 0x25dfdbfd}, 0x10}], 0x6, 0x0, 0x0, 0x8008000}, 0x40000) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000040)=0x346) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) 03:34:39 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:39 executing program 2: 03:34:39 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4026, &(0x7f0000000080)) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'system.', 'debug_want_extra_isize'}, &(0x7f0000000100)='wlan1.ppp0\x00', 0xb, 0x2) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x200000, 0x0) renameat(r1, &(0x7f00000001c0)='./file0\x00', r3, &(0x7f0000000240)='./file0\x00') [ 1103.917710] EXT4-fs (sda1): re-mounted. Opts: [ 1103.995981] EXT4-fs (sda1): re-mounted. Opts: [ 1105.813133] kauditd_printk_skb: 386 callbacks suppressed [ 1105.813142] audit: type=1400 audit(2000000082.160:53542): avc: denied { map } for pid=18897 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1105.842082] audit: type=1400 audit(2000000082.160:53543): avc: denied { map } for pid=18897 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1105.865258] audit: type=1400 audit(2000000082.160:53544): avc: denied { map } for pid=18898 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1105.887601] audit: type=1400 audit(2000000082.160:53545): avc: denied { map } for pid=18898 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1105.910669] audit: type=1400 audit(2000000082.160:53546): avc: denied { map } for pid=18899 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1105.933008] audit: type=1400 audit(2000000082.160:53547): avc: denied { map } for pid=18899 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1105.955913] audit: type=1400 audit(2000000082.190:53548): avc: denied { map } for pid=18900 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1105.979021] audit: type=1400 audit(2000000082.190:53549): avc: denied { map } for pid=18900 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1106.001963] audit: type=1400 audit(2000000082.190:53550): avc: denied { map } for pid=18901 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1106.024251] audit: type=1400 audit(2000000082.190:53551): avc: denied { map } for pid=18901 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:44 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(0x0, 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:44 executing program 2: 03:34:44 executing program 0: 03:34:44 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:44 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:44 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x20000, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x33, 0x80) sendfile(r0, r1, 0x0, 0xa195) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) r4 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f0000000340)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4e20, @local}, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)='r\xa1\xff\xebB\x00', 0x7, 0x4, 0x800}) bind(r4, &(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200900}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0xa, 0xfffffc45, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x0) mount(&(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', 0x0, 0x122cc25, 0x0) r7 = socket(0x0, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="400000002900e50d00000000000001b80000", @ANYRES32=r8, @ANYBLOB="00000200ffffffff"], 0x3}}, 0x0) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r9, r10, 0x0, 0x666d) sendfile(r9, r10, 0x0, 0xa195) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r12) fchown(0xffffffffffffffff, r11, r12) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x880}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@getchain={0x38, 0x66, 0x400, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0xffe0}, {0xfff6, 0xffff}, {0x16, 0xfff2}}, [{0x8, 0xb, 0x428}, {0x8, 0xb, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x34004000) 03:34:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0xd) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000180)=0x0) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x1ff, 0x20}, {0xfff, 0x200}], r4}, 0x18, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 03:34:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000100)=""/17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x2, 0x7d, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000ca6a6d42e717b37032dac4840896f8e4a1ba6f8c0db41ac267b469078545c9ecfbaac7cf642742eac1b127c29f42", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0xe2, 0x1000, &(0x7f0000002700)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) pipe(0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') 03:34:44 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(0x0, 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffff, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, 0xffffffffffffffff, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, 0xffffffffffffffff, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:44 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:44 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1108.818925] EXT4-fs (loop2): error: journal path ./file0 is not a block device 03:34:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffff, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, 0xffffffffffffffff, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, 0xffffffffffffffff, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1108.987604] EXT4-fs (loop2): error: journal path ./file0 is not a block device 03:34:45 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x3f) r0 = add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="ccdc7ce5917128fb18d619a96c3450f43fd5763d1ea70adb516156860c74ac22668f839f91ba5e31831e23e24fc44cc01f80218c61c25123277cbbf947706a303473f5c873e4da36bd7ffea18e6673f37499bba4f92268d82ba07cc9c8a00433606397b2e4ecb40147fe2fad58379e791f37cfe0a2dc0d042aee20b06fccb0ffbabc2437182e3174172d470c5abf34e9d057c782128eed190722d5a3871b5837459cd5bf8ff941", 0xa7, 0xffffffffffffffff) keyctl$reject(0x13, r0, 0x80, 0x10000, 0xfffffffffffffffe) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0xa195) dup(r1) creat(&(0x7f0000000180)='./bus\x00', 0xd52f3fe5cc82e46e) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0xfffffffffffffff9}, {0x801, 0x0, 0x80000001}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x5, 0x3, &(0x7f0000000500)=[{0x0}, {&(0x7f00000002c0), 0x0, 0x4}, {&(0x7f0000000340)}], 0x1002, &(0x7f0000000300)=ANY=[@ANYBLOB="6158066f5f64615f616c6c6f63070000003030745f6d6561737572652c000000000000000000000000000000000000000000003c9146f801fd41c5c690d8583e40bf2381e34e291aa2b37fb701a54efc117fe53f1c1aeb0a91989421237c1bb07c7104b7465d421f7f3b30faea88848b3b000000000000000000000000004d0cb33ecc2522b06d840f7c5956386689722cd99fe60dcd219c51471e64bc5c5a41888e9c1cd66e21dd6b2b1881c940bc7e63436e4ece4172b5f26d9cb224b8060c857009c1784457c9a7280fe45d6cf7fde97d000000000000000000"]) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r4, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) renameat2(r4, 0x0, r4, 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f0000000480)=ANY=[@ANYBLOB="070000000000000000000100000000"]) 03:34:45 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="64656275675f77616e745f6578747261bc6973697a653d3078303030303030303030303030303330302c00"]) 03:34:45 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:45 executing program 0: r0 = socket(0x4000000000a, 0x3, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@abs={0x3}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) recvfrom$unix(r3, 0x0, 0x0, 0x40000000, 0x0, 0x10102) ioctl$SIOCGSTAMPNS(r0, 0x8906, 0x0) 03:34:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffff, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, 0xffffffffffffffff, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, 0xffffffffffffffff, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1110.007174] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra¼isize=0x0000000000000300" or missing value 03:34:46 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:46 executing program 0: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair(0x0, 0x5, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x29b30e782a7f2b0b, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x52) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000002c0), 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x50, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x28, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, [@tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}]]]}}}]}, 0x50}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f00000000c0), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) fcntl$dupfd(r2, 0x0, r2) [ 1110.213356] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra¼isize=0x0000000000000300" or missing value 03:34:46 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7f, 0x5, &(0x7f0000000500)=[{&(0x7f00000001c0)="6e48dc256c08255bf84d86ff31b2084c117701d7672993652b9fe09c7de71f92daf0dd2135c121dc7aa231e6c13b8473d8984530ebd4be3d07057942bcf5f3ddf637af51577064240277b6751ce96d2a00a08e3046a8401d7569e2e7e3d05b45cfba57501e6e359e22a10c9a4eb6861b4ccbc9fcef698c5c1dc80c7a4447a535c4b440d52596f4f1bc863add406e2751208e6b7470c2a98ffa90c5e2d8e8", 0x9e, 0xffffffffffffdee9}, {&(0x7f0000000280)="4ff26c84e59d135983a6bac559119456c5658f4f635261721da1cb2ea8737918a93fd9", 0x23}, {&(0x7f0000000300)="a6fbf337332b4541e31dc256da5b07f380d69a91ef589a5fa2e375bc3c08f2cd22a9dc366f6dc73964a6f7c903052705d50d9a7b7f15833dd6293b0fe802d9637cdb845b093abdc7c015fdbd5fdaf3fdadda0b84255acb21e62ab3e5f8b45aad2e882312f5fae850e2431b17ba7105444c324f65ad453b1ca24b963cab0cf83242a78285c2dc31aa122646283bac7f3226b764424baf2235b343497941c8b951962af081d3434f96b20c0c8e695be894d1c6fc3124bff5d067519c40e1ca4d7705b1c034df67db98183fc3c9b9a3", 0xce, 0xe}, {&(0x7f0000000400)="fdb62f048521bfc897d7778661052b2f240309e32eebb5c99dc6f7917cea2da978b1f9f7754852b00b04df6739dc3c0ee750f6f746328e58ea45ec7702685e671f7ace87665eb2baf2b3bbbe6aa27d2172ef22ff9e782b218d6d0b4c65e7f2b9631c671a77edb32d79785913d1a467a3992306ea84757ca7ffe6c8201ae5554fce63d6ac29967be4f3c9c1e4d743064d79655bd8c4e02831ea0901c9b7104ee0ede528f29dc42fbfb1106a2d6dcaa39ae4e316", 0xb3, 0x9}, {&(0x7f00000004c0)="68037bd248db635c1a72589f3d84e75cb91d90e12c4ca01cd3d5246a1fe9ef13b8076b24052a10d2377fe426ae8cd369900304369e02b2c65a2f", 0x3a, 0x4}], 0x40, &(0x7f0000000900)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}, {@nouid32='nouid32'}, {@usrquota='usrquota'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x1a, 0x36, 0x36, 0x34, 0x31, 0x33], 0x2d, [0xfff94b297fb6c936, 0x38, 0xdadec31a090d735e, 0xc9db85d4db511e2c], 0x2d, [0x50840e7239cb15ef, 0x66, 0x0, 0x7f], 0x2d, [0x28e602f85836772c, 0x37, 0x32, 0x63], 0x2d, [0x64, 0x65, 0x65, 0x34, 0x33, 0x32, 0x34, 0x65]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, '!'}}, {@dont_measure='dont_measure'}, {@audit='audit'}, {@dont_hash='dont_hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'debug_want_extra_isize'}}, {@uid_eq={'uid', 0x3d, r3}}]}) r4 = gettid() tkill(r4, 0x40020000000c) r5 = getpgrp(r4) write$P9_RGETLOCK(r1, &(0x7f0000000040)={0x34, 0x37, 0x1, {0x0, 0x5, 0xe2a, r5, 0x16, 'debug_want_extra_isize'}}, 0x34) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:34:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x0, &(0x7f00000001c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x16f, 0x1a0}]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={0x0, 0x4}, 0x300, 0x0, 0xfffffffd, 0x4, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup(r1, 0x0, 0x200002, 0x0) getgid() r2 = memfd_create(&(0x7f0000000300)=':trusted!{\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB='_'], 0x1) fcntl$addseals(r2, 0x409, 0x0) pwrite64(r2, 0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)=0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) inotify_init1(0x1c0400) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) socket$inet6(0xa, 0x0, 0x2) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000080)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) [ 1110.839592] kauditd_printk_skb: 362 callbacks suppressed [ 1110.839604] audit: type=1400 audit(2000000087.180:53914): avc: denied { map } for pid=19093 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.025748] audit: type=1400 audit(2000000087.270:53915): avc: denied { map } for pid=19093 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.204504] audit: type=1400 audit(2000000087.300:53916): avc: denied { map } for pid=19093 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.350155] audit: type=1400 audit(2000000087.310:53917): avc: denied { map } for pid=19093 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.514320] audit: type=1400 audit(2000000087.350:53918): avc: denied { map } for pid=19097 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.670162] audit: type=1400 audit(2000000087.360:53919): avc: denied { map } for pid=19097 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.775491] audit: type=1400 audit(2000000087.370:53920): avc: denied { map } for pid=19093 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.870133] audit: type=1400 audit(2000000087.410:53922): avc: denied { map } for pid=19097 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.992208] audit: type=1400 audit(2000000087.410:53921): avc: denied { map } for pid=19093 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1112.117799] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1112.426146] loop2: p1 < > p4 [ 1112.429665] loop2: p1 size 2 extends beyond EOD, truncated [ 1112.490558] loop2: p4 start 1854537728 is beyond EOD, truncated [ 1116.333122] kauditd_printk_skb: 683 callbacks suppressed [ 1116.333131] audit: type=1400 audit(2000000092.680:54601): avc: denied { map } for pid=19379 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.360929] audit: type=1400 audit(2000000092.680:54602): avc: denied { map } for pid=19379 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.663494] audit: type=1400 audit(2000000093.010:54603): avc: denied { map } for pid=19380 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.708067] audit: type=1400 audit(2000000093.010:54604): avc: denied { map } for pid=19380 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.737860] audit: type=1400 audit(2000000093.080:54605): avc: denied { map } for pid=19383 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.760917] audit: type=1400 audit(2000000093.090:54606): avc: denied { map } for pid=19383 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:53 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:53 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x0, &(0x7f00000001c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:53 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/vga_arbiter\x00', 0x500000, 0x0) r2 = perf_event_open(&(0x7f0000002440)={0x0, 0x70, 0x1, 0xc7, 0x7f, 0x7, 0x0, 0x9, 0x48406, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x20, 0x100}, 0x6a0, 0x1ff, 0x4, 0x0, 0x3, 0x80, 0x7ff}, 0x0, 0xe, 0xffffffffffffffff, 0x86b42add6038bbb6) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002740)={0xa4, 0x0, &(0x7f0000002580)=[@release={0x40046306, 0x2}, @acquire={0x40046305, 0x2}, @reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60, 0x18, &(0x7f0000002300)={@flat=@weak_binder={0x77622a85, 0x1202, 0x2}, @ptr={0x70742a85, 0x1, &(0x7f00000022c0)=""/2, 0x2, 0x2, 0x1c}, @fda={0x66646185, 0x6, 0x2, 0x3f}}, &(0x7f0000002380)={0x0, 0x18, 0x40}}, 0x40}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x58, 0x18, &(0x7f00000024c0)={@flat=@handle={0x73682a85, 0x14, 0x3}, @ptr={0x70742a85, 0x0, &(0x7f00000023c0)=""/121, 0x79, 0x2, 0x100}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000002540)={0x0, 0x18, 0x40}}}, @exit_looper], 0xe0, 0x0, &(0x7f0000002640)="469d349226cc8be34965c8d8a81418d7bb3ebdc9cda2f093069dbf2f64cc99c0cb8e8ae815447a49a046482a633651eb75d49c2fd836648f060cf07e9250e1531fada90b532da8fb63a7741f395367b691aa200bab312a8031b6915ab3ab9a66204a6854aa0a167d4e8822c1bcddb27e375717de14bf06c27a8a6b9c3d5791f5b0fa8b7c4dc4539dc6b802cb539730d26065867e4c093425b6f2df590c19e694da1807231b16f22b8748165762c65becf979f8a899c163c2b7330da34a130965eb32656d70c7e7a7167c85b56b69546b54f609d7d23d7f839918c0dca14d89b3"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000019c0)={0x5a7, 0x7ff, 0x7, 0x100, 0x2, [{0x80, 0xfffffffffffffffe, 0x80000001, 0x0, 0x0, 0x2008}, {0x61, 0x1f, 0x3, 0x0, 0x0, 0x1000}]}) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000001a80)={'HL\x00'}, &(0x7f0000001ac0)=0x1e) bind(r1, &(0x7f0000000800)=@nfc={0x27, 0x1, 0x2, 0x5}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0x6, &(0x7f0000001e80)=@raw=[@exit, @jmp={0x5, 0x1, 0x65804bf750d4bede, 0x1b, 0x4, 0x2, 0xfffffffffffffff0}, @alu={0x7, 0x1, 0x5, 0x8, 0x5, 0x0, 0x8}, @jmp={0x5, 0x1, 0x6, 0xa, 0x3, 0x10}, @map={0x18, 0x8, 0x1, 0x0, r4}], &(0x7f0000001e40)='\x9e\xa8\x13\xde\x82\xb6/f\t\xd5!#\xffhd\xf7\xac\xd3\x15\x84e\n\x16g/F\xc0\x8b\xee*\x13Lh?Z%\xcc\xcf\xf4L\nx\x19\xb6\xab\x86584\xf2O\x95-`', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x70) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/urandom\x00', 0x800, 0x0) pwritev(r5, &(0x7f0000002240)=[{&(0x7f0000001f00)}, {&(0x7f0000001f40)="a3", 0x1}, {&(0x7f0000001f80)="e94251cec0939bf34644307452a30c327e5d8bcef24ca563e4b24b81ebcb701b1b80582ab773ad6d738d5ae82b272015a19e7e6758979a1413af62660beb7c333d06585d8e8c0b64460a3f6ad806bc0d33ce7f5ed6f7f6ad512215fa1ebc7a3a9d9f379721565cc6d8646c668a023ea44f3c490f53db6f99fb13e9676937cb35bac7704f40a61159fae1f6ae79da90fc4da51a474ccb5266a341fd821a4429eae816bbe10dc3ec94696c95f8d9c21378ce88b5315648294c4c991561b0143892bf6b6a9c0a59bbaa2d6873c3", 0xcc}, {&(0x7f0000002080)="811dab7184bc328adf6317b6209cf6573be429a837ae7f01f75cc27bdea0effadde3fdc834c389e25d2a8640386b0aca", 0x30}, {&(0x7f00000020c0)="155565d2c5f1660c7e05a9bd9865e0239aa7bc487784070ed275c8a9844a63d7a8e31be62926ba43376442e2f125e2dccea51b00cecebf83bf2c31eb63cd850891073575b4256b626c6dcf508769a3d952ef2639d5af42f6a75b7bd2b2736d", 0x5f}, {&(0x7f0000002140)="20f4f2dd4ae3bf6c47bc648e18205566fe2b2c7de9d8ccd15e36d55429b447607783213024ea3dfdb3d176255b8696659b4a1f2b0fa668eebac9c51b035dced2a10f26a2a9d1e51eb1c981e59f039426bb51d6012cf2439cef5e7c0c379df55d85c7b9e3c204a1f2036784878c9b6ecff0efc2935e724d1dfa27b9f3f3af", 0x7e}, {&(0x7f00000021c0)="e65130bb4bb1818ceae1f34a569f35fa2e6c41ecc67873d027fe17c911860b77cfae560b24db1ea1df46f39d3411c30159414dca4e3f34a3e2c063df4343ac8b9d62c30db58af2868c95ad44fc526996e334cb3e35f4304753bf477075b6908fa938b4b95f4c0dcfe145e07bb323254c83bf83a5ed6410", 0x77}], 0x7, 0x8) syz_mount_image$ext4(&(0x7f0000001b00)='ext4\x00', &(0x7f0000001b40)='./file0\x00', 0x80, 0x3, &(0x7f0000001d40)=[{&(0x7f0000001b80)="7875de254b2df2c55b95948e9818041f27e1c5a1225b7ade08b489d1d08000f25cce4584a9300735cbf6b61b91e90fa64ee6ba8cf291689f9ab392cc709448bb6920755a7c5ac497235173c84fe73097cc19739c9cef8bca4db71dd0669b4000bdb3a0bb7f2db1f52bb2e6d028874d55e03274fcd147fda053c4b587fb39d2a62b87ca4de345e9cbafef4e74237d736c7aa800444663", 0x96, 0x2}, {&(0x7f0000001c40)="69cd88f9014d8033e4cdeed777e1d730cafdac3290be97be5acdf089bf520eb0bd4943784ead3f9cea", 0x29, 0x2433}, {&(0x7f0000001c80)="7da3ea8281c54fd4ddb3fb471f96438a40e7331b278a5972af615a287e4a7876733d41bd74920942699430597a71e2a9b5e6255e3c849b219a7f79bd9bfd7aac70973628147c2ba08e23ca21f0bf6cc904cd05e63f272567675b36cf1e83437a8158ab0fb6bde09adb722792481adff7219b20a6fe4aca2d7220d54677f900ae9e34", 0x82, 0x6d}], 0x40000, &(0x7f0000001dc0)={[{@min_batch_time={'min_batch_time', 0x3d, 0x9}}, {@discard='discard'}, {@mblk_io_submit='mblk_io_submit'}, {@data_ordered='data=ordered'}, {@nogrpid='nogrpid'}, {@dioread_lock='dioread_lock'}], [{@subj_type={'subj_type', 0x3d, 'debug_want_extra_isize'}}]}) sendmmsg$sock(r0, &(0x7f0000001840)=[{{&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x1, 0x3, 0x1, 0x0, {0xa, 0x4e23, 0x32, @loopback}}}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="6198d3287d66ee6b5c456844410dd93d3802e54669fa4fa80208a0f6927472a4ec7f5bdf9c2ba4fc887f906fccf5ae8011082fa3ea8e163b3ed67502d7934aff988648cc5358324dbd058b8a24540ecdfec18926f85dce033ca654d74c9dd157edd9ea2bded37cd814fbd8aec5733d87f23ac0b1c2f25853fcb620037197cd6e8f8f445649ed2c23a5fb82efa2ebaf6e009e585a38d6563f6f532de88551f747ff0146f74e", 0xa5}, {&(0x7f0000000280)="fe0552318ec191751c8e6f2f0c8ebc97b70ff1ceada063501844495df389e53bc89070072ffe04b4d4d3213b745f22a76735e7f5794d4acddacb81ffbdc443fbeef301363fef130c78c3ffdf370a5d7378302ec820afc77614c67e7dc4419b131d6bf3ccebf9f6e6a5f8fbe5aa1892cca57aa5763ae98c77ff0a48b564f61bef72209d87744f09d26acab3e4e61b690d83f0bab7580fc663b68d441ab6eb322f67b17c1fb2f7cd", 0xa7}, {&(0x7f0000000340)="764210dabfe184898e0b66c68bc4f3d73e2dc7ad510bf71569051704bed9d0e08f78940f2958cd7d4bb3481f5b29230235397ad5bfa42bb048c5f9565ada021b1451319ebca0cd6ce642039049e04c3b838e7a260e2b044bb4a6a9dea2493309209856b8f0811ac7f44cbd4524ee8051634dff326b1bba83e8c385b16eb6889a0ce15a3e1874f4fc7dda3db881745cb6295a2af62cc8009994124150238cf02d2b9327736bac8a2caf1f8ada942c474909a332a67607f701b004dd6aac3417c477ee74c079c952dd9a073c975927563afcd7ca1e", 0xd4}], 0x3, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7fff}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x10000}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x8000}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0xfff}}, @txtime={{0x18, 0x1, 0x3d, 0x100000000}}], 0xd8}}, {{&(0x7f0000000540)=@nfc_llcp={0x27, 0x1, 0x1, 0x4, 0x7f, 0x9, "b2d75dec18a9f6a06d3153a61fc79110fe7aa1b31f594355f3614ae867a964eb7aa658f70b97115e47a1d6627ceb492a4ad1582200437a3690231d35ff6bd2", 0x22}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)='%@', 0x2}, {&(0x7f0000000600)="d1da87595a5320fd46ccf055cf8762be7076eb1fc6ec278212b410613180359b1c2e821a633897228e37257a6f941a69b2dc5e3ee01b4fb1bab6791531ee3e2e17e9cf5ea440bbc57860216a7759fc425ac3e5ca05404b2efb77767036ecc512b820cca71e396fb6", 0x68}], 0x2}}, {{&(0x7f00000006c0)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)=[@timestamping={{0x14, 0x1, 0x25, 0x8b0}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x7fffffff}}], 0x60}}, {{&(0x7f0000000bc0)=@nfc_llcp={0x27, 0x0, 0x2, 0x6, 0x1, 0x4, "311604c4f3f60ae6f871a3c73f329331c936e1d81385520e8a3f8a0148b619ef554c3414403cd5deef0ffacdf9276b18d57da7fcd5a79730f6afcad88f9539", 0xd}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000c40)="31f48db839acdc08681d0858748ab2d6788bbbfd948e57f1c80684c8a7663838b830d7177cdc533e1c1cb4919183f20dcf914a4145d3", 0x36}, {&(0x7f0000000c80)="7e106568bf2c59f7f8ada4fac29cf8711bb6cb4a68e770cf57c0cf4b67ed72e1018e326d43f2afa3d4adc6c9b1baacedfff329550783a2238af8ea2047a07eb245453e5eb4a5c1f0e25e51e226fdfe49b98698fd1ba01f59b498be6c48a52beee2f361a41338f3cb7430b967", 0x6c}, {&(0x7f0000000d00)="478d2274852ed4f39dee2761ef7f76758df1ff1405f1ad255f34f6c5ed799d5dcb740dcf5b7c64392525be5ea8efc54d949f9f9d0dbf0a2a621b204ca46cc25e42006aa324307667f1b69325e1d15b9fe98ec0a36be99422bb7842af3559e6d01a9b53f7f6b72da011a3b901d5736db7c68b73e00b1f4470fde5d30302b0684276232745ec61a70f60fe7b810112ad0647da2c84155e340e950c61ceeeb3e71c7e8c41e2d5d1ba275d29c4fdaffeae1c2ce5f3164199b532", 0xb8}, {&(0x7f0000000dc0)="94ba04583048fcfcc439c7c11e6c734eceac267f21e7f43a335de59405e16759780916ba5a89701d9868f6e317908e0e99cb784717a5bd96a45f5bbb222d9d816da40d11008b8baa4df2a67bbdde2da9bbcbb241555c55b017f3e40e8d1e82339bc9142a128bbc13a46aedd08c7861d7b498f45e473959aacc79f4d2f735e5c012d5", 0x82}, {&(0x7f0000000e80)="b092f01bcc48875f053bdf86ee3caa375c3c45be37368729129c8114555143233d063115eee6d6f44aee3673c53a1dd9c725824c69997e6dd2a5d48338b64b803c199afd2095208c2717d5295037c4a97f4b011654e62fa137cc1650fea90f83ad", 0x61}], 0x5, &(0x7f0000000f80)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xfffffffe}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x7fffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}], 0xc0}}, {{&(0x7f0000001040)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x1f, "944fda0f3d32095c6871b9335b88e10d47cc8a79ee6ccdd59280f3021abe1890e5561e918cf4726c855e2e544f7e061f76863118166c53e36993dd58d0fb71", 0x24}, 0x80, &(0x7f0000001380)=[{&(0x7f00000010c0)}, {&(0x7f0000001100)="e71a142babcda42c5a7b983543a3f4952f043c52d336f446c55cf4f2c47eb1cbec0c2a25173afd7094cbc7d1153d1a37079c0b352840b423ed6298e94dd5f5ddc8cdd2a49291037d72fd03df1fdcb6a7bc2ac083a748637a95139507a9e9ef2547cb4e2057caf1f8215a48f8116e82770dc802f33be67e0252e76474b2d678fa0ef8aa198fd5ecb6701743cda1ad154887e5646d13916d3bc78c546d435e12b106d2816077c9c58d", 0xa8}, {&(0x7f00000011c0)="ad766a209b2b", 0x6}, {&(0x7f0000001200)="71f8f997523410c2b31a7bab5612bcad03d43be1070a859d9e2771c97ac27979c5fc8327d12ec2c8f0fedef8df5203c292df5aa099eba646228f82dbebb47c6799728f76699dc41c4e756964683c273f4e7e717f3321ad976597655104a33c42c82d3b483a6b7c24c1eef1e63babc11b807df1bff806b150477596a4affa9948a84ad6c784bfde", 0x87}, {&(0x7f00000012c0)="e18424d829839700f54c174baad143f8a16ed29bc4088953a3d9eab95eb47110f782f04489c6be86", 0x28}], 0x5, &(0x7f0000001400)=[@txtime={{0x18, 0x1, 0x3d, 0x1f}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xf1e}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x5dab0693}}, @mark={{0x14, 0x1, 0x24, 0x3e}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x10000}}, @txtime={{0x18, 0x1, 0x3d, 0x1f}}], 0xf0}}, {{&(0x7f0000001500)=@llc={0x1a, 0x0, 0x2, 0x0, 0xf3, 0xfc}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001580)="7146b65dfdd898e5d2e56d0e21c0d2dc8e12bdeaf037e2fe13a639c84efa95b5a2096adfcc52061dab05a0ff87e4e2a85c392cde1913934111dc6aaec49cb524fac1f9b816377d8187cde8a4dbe0f3ee787299d02eb63035fa11daba5f7e3f7f0682cc92ca53a774f05e45573506a0c67bb61a362cb25f149eb930179d3623889a3a94d498995b4bbacfe209f4aa9235a08888e6c66fd62d7ffd5483efa25866a527872d975dfdb2cc94aeaa320e70f5ba943386f40c9b", 0xb7}, {&(0x7f0000001640)="12113693c4197b8b0e6819e58e959446a6d5590e018f11ebaf6731f80dc1e1cb22709bb75b9ee3685f9f2c18d3e86250d00794debda76bbc32e755cb831d863b1e7fe5ed2310f99a1c7e56eae8d54044e18f20fd6abcb2803e60768dae859b43fcb0dcc36de72416f8215803c94f39da338d3592", 0x74}, {&(0x7f00000016c0)="a9dceb3f441cccab885ea6acfd4e034387248a668b0c8cd964107b7077b731d050d3b565190bb8628ed86d42790765b8f334134af4b2b45ccc3f9d824f7d1e77e6d5d0555c330214894aeb9e579623a2676a969dc524ee8b0856f433ebab8ced0276bb13e717cc", 0x67}], 0x3, &(0x7f0000001740)=[@txtime={{0x18, 0x1, 0x3d, 0x3f}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x20}}], 0xd8}}], 0x6, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f00000010c0)='nbd\x00') 03:34:53 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x10, &(0x7f0000000000)=ANY=[]) 03:34:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x13e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0303030003004c0000001100ff015b4202938207d9fb3780398d5375010000007929301ee616d5c01843e06590080053a6e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1a", 0x1af, 0x0, 0x0, 0xfffffffffffffec9) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r4, 0x0, 0x4000000000dc) lseek(0xffffffffffffffff, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x20000, 0x2) write$P9_RREMOVE(r5, &(0x7f0000000180)={0x7, 0x7b, 0x1}, 0x7) syncfs(r4) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r7, &(0x7f0000000600)="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", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000600)="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", 0x200) sendfile(r9, r10, 0x0, 0x666d) sendfile(r9, r10, 0x0, 0xa195) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001980)={&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYBLOB="e23837d4b0700dbe801d9ce0dc77caf87fcb74664a74222c024968a5d8bcb5085735fce72993bcb225d1b3acb833d2575127103d46df04e4e1e7dc6ecc708dc2fc", @ANYRES32=0x0, @ANYRES16=r7, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB="f35b05f29f56a3e999f89e555fb89b1493a6e8872d6d861952639a472a1b9190d1b69abd584253213ff03a0668c0e9c6a6e50b49453d288b17e72e731e6382cccaadb8fe880222d0656a07bb99075cff72689163e862dd50e99ed1e6c369d2a3e42459f06c30eee0afd85a8311e100380173e41d2644b6725c90297f6ea10412c41409f62190054b43d0b1d34fd5b98404c84e11e8a8c39a6af0ca9c3ae5226eefa95cfa5d48cebe10b60e77eaa6b932130bee437828", @ANYRESDEC=r9, @ANYBLOB="ea3d5237a99d316f0dadad27c6e4ef070db714b5c45718f303a26ae649a6be9f3d1bcd31caf7b4857a7e60ad862ee6f795ee63"]], @ANYRES16=r6, @ANYBLOB="00285ddd24730327bd7000fedbdf250e00000008000600050000004400010008000b0073697000080009003b00000008000800000000000c0007002e00000004000000080004004e2200000c0007006da3241a08000000080001000a0000001c000300080001000000000008000300000000000800070000000000080005000180000030000100080004004e20000014000300e0000001000000000000000000000000080006006468000008000800258f71af080005"], 0x3}, 0x1, 0x0, 0x0, 0x60800}, 0x44000) syz_genetlink_get_family_id$nbd(0x0) [ 1116.785995] audit: type=1400 audit(2000000093.090:54607): avc: denied { map } for pid=19383 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.851462] audit: type=1400 audit(2000000093.100:54608): avc: denied { map } for pid=19383 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.887668] EXT4-fs (sda1): required extra inode space not available [ 1116.896906] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:34:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x0, &(0x7f00000001c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1116.951900] audit: type=1400 audit(2000000093.100:54609): avc: denied { map } for pid=19383 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:53 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:53 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1117.047588] FAT-fs (loop2): bogus number of reserved sectors [ 1117.123875] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1117.145372] audit: type=1400 audit(2000000093.100:54610): avc: denied { map } for pid=19383 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x44) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='@em1\x00', r1}, 0x10) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) write$P9_RVERSION(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff7affffff08003950323030302e4c"], 0x15) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xb, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x21, @loopback, 0x4e20, 0x3, 'ovf\x00', 0x8, 0x7, 0x61}, 0x2c) r5 = request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='ppp1/\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=')%em0-\x00', r5) 03:34:53 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:34:54 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) fcntl$setstatus(r1, 0x4, 0xeecf438d15b9c466) r2 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'de\x00u\x927\xb8\x8a\x8a\x04\x00\x00\x00w\xe3\x00\x00\x00\x00\x00\xff\x00', 0x3d, 0x300}}]}) 03:34:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, 0x0) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:54 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x13e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0303030003004c0000001100ff015b4202938207d9fb3780398d5375010000007929301ee616d5c01843e06590080053a6e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1a", 0x1af, 0x0, 0x0, 0xfffffffffffffec9) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r4, 0x0, 0x4000000000dc) lseek(0xffffffffffffffff, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x20000, 0x2) write$P9_RREMOVE(r5, &(0x7f0000000180)={0x7, 0x7b, 0x1}, 0x7) syncfs(r4) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r7, &(0x7f0000000600)="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", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r9, r10, 0x0, 0x666d) sendfile(r9, r10, 0x0, 0xa195) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001980)={&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYBLOB="e23837d4b0700dbe801d9ce0dc77caf87fcb74664a74222c024968a5d8bcb5085735fce72993bcb225d1b3acb833d2575127103d46df04e4e1e7dc6ecc708dc2fc", @ANYRES32=0x0, @ANYRES16=r7, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB="f35b05f29f56a3e999f89e555fb89b1493a6e8872d6d861952639a472a1b9190d1b69abd584253213ff03a0668c0e9c6a6e50b49453d288b17e72e731e6382cccaadb8fe880222d0656a07bb99075cff72689163e862dd50e99ed1e6c369d2a3e42459f06c30eee0afd85a8311e100380173e41d2644b6725c90297f6ea10412c41409f62190054b43d0b1d34fd5b98404c84e11e8a8c39a6af0ca9c3ae5226eefa95cfa5d48cebe10b60e77eaa6b932130bee437828", @ANYRESDEC=r9, @ANYBLOB="ea3d5237a99d316f0dadad27c6e4ef070db714b5c45718f303a26ae649a6be9f3d1bcd31caf7b4857a7e60ad862ee6f795ee63"]], @ANYRES16=r6, @ANYBLOB="00285ddd24730327bd7000fedbdf250e00000008000600050000004400010008000b0073697000080009003b00000008000800000000000c0007002e00000004000000080004004e2200000c0007006da3241a08000000080001000a0000001c000300080001000000000008000300000000000800070000000000080005000180000030000100080004004e20000014000300e0000001000000000000000000000000080006006468000008000800258f71af080005"], 0x3}, 0x1, 0x0, 0x0, 0x60800}, 0x44000) syz_genetlink_get_family_id$nbd(0x0) 03:34:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, 0x0) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1118.849772] EXT4-fs (sda1): Unrecognized mount option "de" or missing value 03:34:55 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:55 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) prctl$PR_GET_SECUREBITS(0x1b) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000000c0)={{0x32, @loopback, 0x4e23, 0x2, 'lblc\x00', 0x0, 0x26a, 0x7a}, {@remote, 0x4e20, 0x0, 0x8, 0x5c94, 0xdb0c}}, 0x44) 03:34:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, 0x0) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:34:56 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:34:56 executing program 2: ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000000)={0xc8ee, 0x1, 0x1}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2688}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x10000, 0x0) socket$netlink(0x10, 0x3, 0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000700)={'eql:\xb3\x87\x00\x00\x00\x00\x00\x00\x00\x02\x00', @ifru_flags=0x3301}) 03:34:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x13e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0303030003004c0000001100ff015b4202938207d9fb3780398d5375010000007929301ee616d5c01843e06590080053a6e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1a", 0x1af, 0x0, 0x0, 0xfffffffffffffec9) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r4, 0x0, 0x4000000000dc) lseek(0xffffffffffffffff, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x20000, 0x2) write$P9_RREMOVE(r5, &(0x7f0000000180)={0x7, 0x7b, 0x1}, 0x7) syncfs(r4) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r7, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000600)="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", 0x200) sendfile(r9, r10, 0x0, 0x666d) sendfile(r9, r10, 0x0, 0xa195) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001980)={&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYBLOB="e23837d4b0700dbe801d9ce0dc77caf87fcb74664a74222c024968a5d8bcb5085735fce72993bcb225d1b3acb833d2575127103d46df04e4e1e7dc6ecc708dc2fc", @ANYRES32=0x0, @ANYRES16=r7, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB="f35b05f29f56a3e999f89e555fb89b1493a6e8872d6d861952639a472a1b9190d1b69abd584253213ff03a0668c0e9c6a6e50b49453d288b17e72e731e6382cccaadb8fe880222d0656a07bb99075cff72689163e862dd50e99ed1e6c369d2a3e42459f06c30eee0afd85a8311e100380173e41d2644b6725c90297f6ea10412c41409f62190054b43d0b1d34fd5b98404c84e11e8a8c39a6af0ca9c3ae5226eefa95cfa5d48cebe10b60e77eaa6b932130bee437828", @ANYRESDEC=r9, @ANYBLOB="ea3d5237a99d316f0dadad27c6e4ef070db714b5c45718f303a26ae649a6be9f3d1bcd31caf7b4857a7e60ad862ee6f795ee63"]], @ANYRES16=r6, @ANYBLOB="00285ddd24730327bd7000fedbdf250e00000008000600050000004400010008000b0073697000080009003b00000008000800000000000c0007002e00000004000000080004004e2200000c0007006da3241a08000000080001000a0000001c000300080001000000000008000300000000000800070000000000080005000180000030000100080004004e20000014000300e0000001000000000000000000000000080006006468000008000800258f71af080005"], 0x3}, 0x1, 0x0, 0x0, 0x60800}, 0x44000) syz_genetlink_get_family_id$nbd(0x0) [ 1120.212807] EXT4-fs (sda1): required extra inode space not available [ 1120.270246] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1120.375895] EXT4-fs (sda1): required extra inode space not available [ 1120.404866] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1121.343965] kauditd_printk_skb: 255 callbacks suppressed [ 1121.343975] audit: type=1400 audit(2000000097.690:54866): avc: denied { map } for pid=19484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1121.431903] audit: type=1400 audit(2000000097.690:54867): avc: denied { map } for pid=19484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1121.560101] audit: type=1400 audit(2000000097.690:54868): avc: denied { map } for pid=19484 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1121.615855] audit: type=1400 audit(2000000097.690:54869): avc: denied { map } for pid=19484 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1121.690651] audit: type=1400 audit(2000000097.690:54870): avc: denied { map } for pid=19478 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1121.770157] audit: type=1400 audit(2000000097.690:54871): avc: denied { map } for pid=19484 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1121.876312] audit: type=1400 audit(2000000097.690:54872): avc: denied { map } for pid=19484 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1121.935883] audit: type=1400 audit(2000000097.720:54873): avc: denied { map } for pid=19478 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1121.952950] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1121.977032] audit: audit_lost=499 audit_rate_limit=0 audit_backlog_limit=64 03:35:02 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:35:02 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:02 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) mount(&(0x7f0000000040)=ANY=[@ANYRESOCT], &(0x7f00000000c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) ftruncate(r2, 0x800) lseek(r2, 0x4200, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000000)={0xd}, 0xd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) syz_open_procfs(0x0, &(0x7f00000006c0)='net/fib_triestat\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(r1, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x0) write$P9_RLERRORu(r5, &(0x7f0000000000)={0xd, 0x7, 0x0, {{0x38b}}}, 0xd) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) sendmsg$TIPC_CMD_DISABLE_BEARER(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x8, 0x13, @l2={'ib', 0x3a, '\x00'}}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x10) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:35:02 executing program 0: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) socketpair(0x0, 0x3, 0xf9, &(0x7f00000000c0)) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) readv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000041c0)=ANY=[@ANYBLOB='n'], 0x1) ftruncate(r1, 0x8200) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) setxattr$security_capability(&(0x7f0000000f40)='./bus\x00', &(0x7f0000000f80)='security.capability\x00', 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r7 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000011c0)) sendmmsg$inet6(r2, &(0x7f0000000d80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="a56d40fd8bf490b2446ad3fafc3f55852c2f37d0bf981430b1495c6aa6447422ac6468abe0df19fc9c54e66c49df5e1e52041fa6e6e23630ea5a186e26d2800c926365a411a839fae371ef792917ad8455", 0x51}, {0x0}, {&(0x7f0000000480)="ca08ba6413abc0c523168c7af70b61232a7074a02788021cf1dd9c01b7feb34901a4bbdb245d55fc5201aa1eb1f8fe5554d2022fed771e5cad5258295cdaa080d9f43d7d8285eb127730ce4e1a852cfa5ac5afb2468745a1c7e330eb9a677ceb891128a5ac34929058efd79b74abd2524cecac2cd782c5a36b25b7917d65a41f7f86ea39", 0x84}], 0x3, &(0x7f0000000780)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x2c, 0x0, [@mcast1]}}}], 0x28}}, {{&(0x7f0000000900)={0xa, 0x4e23, 0x0, @mcast1, 0xffffffff}, 0x1c, &(0x7f0000000980)=[{0x0}, {0x0}], 0x2, &(0x7f0000000b80)=[@hopopts={{0x20, 0x29, 0x36, {0x0, 0x0, [], [@ra={0x5, 0x2, 0xfff}]}}}, @hopopts={{0x30, 0x29, 0x36, {0xff, 0x3, [], [@enc_lim={0x4, 0x1, 0x3f}, @calipso={0x7, 0x10, {0x2, 0x2, 0x0, 0x81, [0x5]}}, @padn={0x1, 0x1, [0x0]}]}}}, @dstopts_2292={{0x70, 0x29, 0x4, {0x4, 0xa, [], [@ra, @calipso={0x7, 0x30, {0x8, 0xa, 0x8, 0x0, [0x5, 0xd4e, 0x5, 0x0, 0x81]}}, @jumbo, @calipso={0x7, 0x18, {0x3725, 0x4, 0x80, 0x0, [0x401, 0x0]}}]}}}], 0xc0}}], 0x2, 0x0) 03:35:02 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) 03:35:02 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@initdev, @local}, &(0x7f00000000c0)=0x8) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2e2fcc5249579bed39a066696c65c5f75cc973bfb48ff4cde2f6b14e07359c8e84fff3522a31155156f07c80acb7c25ad414fddebf04bb18e0e3bb986ac957b3b7f06ccf7ac3b70906a001f3d26202124e82710577eb1668a0ecf15e232c76633f98c844df"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:35:02 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600), 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)) io_submit(0x0, 0x6, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="004613e77da8a45d7a4f008f1d0a262a75cee9258b04db1a5912b80e04e863e1f05c1a0a204a32a3", 0x28, 0x373, 0x0, 0x2}]) [ 1126.357523] kauditd_printk_skb: 681 callbacks suppressed [ 1126.357533] audit: type=1400 audit(2000000102.700:55515): avc: denied { map } for pid=19759 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1126.503869] audit: type=1400 audit(2000000102.750:55516): avc: denied { create } for pid=19739 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1126.660086] audit: type=1400 audit(2000000102.760:55517): avc: denied { map } for pid=19759 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:03 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1126.830479] audit: type=1400 audit(2000000102.770:55518): avc: denied { map } for pid=19759 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) fremovexattr(r2, &(0x7f0000000180)=@known='system.posix_acl_default\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x80666d) sendfile(r4, r5, 0x0, 0xa195) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x26, 0x3, 0x16, 0x6, 0x0, 0x2, 0x4, 0xa0, 0x1}}) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000000)=""/90) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 03:35:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x200000001, 0x3, 0x2000000000000009, 0x2, 0x0, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000180)}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) fsetxattr$security_evm(r1, &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "e288b055"}, 0x5, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) [ 1127.000273] audit: type=1400 audit(2000000102.820:55519): avc: denied { map } for pid=19759 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1127.128488] audit: type=1400 audit(2000000102.820:55520): avc: denied { read } for pid=19739 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:35:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, 0x0) [ 1127.280537] audit: type=1400 audit(2000000102.840:55521): avc: denied { map } for pid=19759 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1127.430576] audit: type=1400 audit(2000000102.980:55522): avc: denied { create } for pid=19739 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1127.489116] EXT4-fs (sda1): required extra inode space not available 03:35:03 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1127.540159] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1127.572118] audit: type=1400 audit(2000000102.990:55523): avc: denied { write } for pid=19739 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1127.730495] audit: type=1400 audit(2000000103.050:55524): avc: denied { create } for pid=19739 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:35:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x7530}}) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000d80)=ANY=[@ANYBLOB="1c0000006afb243da4cbed8448acf38e6d500200001600000000d7a6e649d968086b35e5f2aadc8689ec72c3", @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x800a5}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xfd, r3, 0x100, 0x70bd29, 0x25dfdbfe}, 0x84}}, 0x8800) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r3, 0x101, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x78b}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xc89f583964d7d9bf}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4882}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x100000008005) socketpair$unix(0x1, 0x1, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) 03:35:04 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:35:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, 0x0) 03:35:04 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, 0x0) [ 1131.368248] kauditd_printk_skb: 488 callbacks suppressed [ 1131.368258] audit: type=1400 audit(2000000107.710:56013): avc: denied { map } for pid=19984 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.396686] audit: type=1400 audit(2000000107.710:56014): avc: denied { map } for pid=19984 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.419965] audit: type=1400 audit(2000000107.720:56015): avc: denied { map } for pid=19985 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.442320] audit: type=1400 audit(2000000107.720:56016): avc: denied { map } for pid=19985 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.466265] audit: type=1400 audit(2000000107.720:56017): avc: denied { map } for pid=19986 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.488833] audit: type=1400 audit(2000000107.720:56018): avc: denied { map } for pid=19986 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.512865] audit: type=1400 audit(2000000107.750:56019): avc: denied { map } for pid=19987 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.535279] audit: type=1400 audit(2000000107.750:56020): avc: denied { map } for pid=19987 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.558462] audit: type=1400 audit(2000000107.770:56021): avc: denied { map } for pid=19988 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1131.580842] audit: type=1400 audit(2000000107.770:56022): avc: denied { map } for pid=19988 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:09 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600), 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xf0ffffffffffff}}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) 03:35:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x7530}}) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000d80)=ANY=[@ANYBLOB="1c0000006afb243da4cbed8448acf38e6d500200001600000000d7a6e649d968086b35e5f2aadc8689ec72c3", @ANYRES16=r3, @ANYBLOB="000329bd7000ffdbdf250f00003e885d290459d16eeec8e404003f0000000578d7eb5a70e56813c4b3edb69b2c0126a63625bf08c0da93d6327fa4ddc0649fa0892b0a7f82b0521f55a9beb3d9ef5903e21b7a5a8f221332ffbcfa57adbe68071b9bce8ac7240003d32dd1c49ec79b5ab0b6e1278941c0cacb26fc546e04f0d630cdcfd2180374e2cf93565fe873a812c887b5b36ce9dde143b8105e2d8f69bb33ff0c81cc44cb6e0790817344d5ab36859dc6c9b3dedd4160eb261626a680061e30f705cc9db8b6ec90fdbe84b6555d9c3d52ed2f9b0bacc4f2c0f70bde7938f6d64f20d16fde5a65b046bca39a65723a36518ead7682ff4b27dd3b3e0ad41801f1f784e310154e1f19689eee1cdb240358a8e55876f325d130deea4e87bd9855fab8d8d682fb543678592daf89e3be82c3fbd2842943feb8782cd8d5756f6f59bf914cae3c373e0d68c3258c90833cce84363768ca60ebe1ac4979feb693a19350fcc57e5e159c87445fa464cbded86c6a4839b0e1ba8c06529c18111e141e0167edff9d78bb151041bcedbdb0"], 0x3}, 0x1, 0x0, 0x0, 0x800a5}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xfd, r3, 0x100, 0x70bd29, 0x25dfdbfe}, 0x84}}, 0x8800) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r3, 0x101, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x78b}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xc89f583964d7d9bf}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4882}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x100000008005) socketpair$unix(0x1, 0x1, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) 03:35:09 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:09 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009d00)={&(0x7f0000001b80)=ANY=[@ANYBLOB="ec942a707c0c0100000090a293f878de91", @ANYRES16, @ANYBLOB="000226bd7000ffdbdf250000000008000100", @ANYRES32=r2, @ANYBLOB="bc00020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e6700000000", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040000", @ANYRES32=0x0, @ANYBLOB="44000200400001002400010071756575655f69640000000000000000200000000000000000000000400000000800030003000000080004000100000000000000", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="3401020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001000080080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400e300000008000600", @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040001000100400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fffbffff3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="fddeaf36", @ANYRES32=r4, @ANYBLOB="f800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000410203000b0000004b0104000900000008000700000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f74785f686173685f746f5f706f72745f6d", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005e0f000008000100", @ANYRES32, @ANYBLOB="c800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000000080007000000000044000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000007a0304006163746976656261636b75700000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008", @ANYRES32=0x0], 0x1d}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vcan0\x00', r2}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000400)={r5, 0x1, 0x6, @dev={[], 0xc}}, 0x10) write(r0, &(0x7f0000000600)="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", 0x200) r6 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r7 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r6, &(0x7f0000000600)="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", 0x200) sendfile(r6, r7, 0x0, 0x666d) sendfile(r6, r7, 0x0, 0xa195) setsockopt$sock_int(r6, 0x1, 0x5, &(0x7f0000000080)=0x1, 0x4) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="f123556a78c8125e99c83be32e8ebc32ea2e5d5d561e4333aea3d513b14a7fa8f73de57d4fd23a3b9b21bdaad9ce0cbd947ca5ddee1fef73d8d278ca3c2ff596f8946056266400948530799b771bb1a68d738aa6a3c3befa8c00a30869da65e4c392db2d1dfaa59cf6c96139cadc41eb679525428ef13b351608d53e59082b53720f621bf849816e0a80848a22bcc3f3481ececc597c80880dca204bf9ccda454681b85dcbb7ef54e82be5503f147c488e6f6eace2aee102f8962ef4649a049c9a6ad572ff3cc69cd4b2cfcfea"], &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x1005004, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000180)=ANY=[@ANYBLOB="64656275675f77616e745f6578747273697a653d3078303030303030303030303030303330302c0059910ec3250ab59e10d9c7075e869184d233c7e19058f21a821a16a174fbdca8a060958d8ac4bd8f8a3010bd6047fe5e9726dcf190c473683f2d46377640dafcdc26e47d225df31b1a5a79e0335b6bca810a32c1e8f597c5f6f3deb565290ece2d6a51d15fadd064d33b7b5af7e4fc38d89d0c757e45f8cf12c6ff7de0a8066b38f24ef02b1ce48056992d8a99e876864bf7fe7b0b0a99986b2eafdf747d75e224052690b37e48c5b66d1e679faab6db374c044228d1e454eb0d6d3bfcad"]) 03:35:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x5, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x800, 0xffffffffffffffff, &(0x7f00000004c0)="33a225421eccd23e67c5f7c9144a2707e7ea1dacb77bf47bda7398efa2f363797f3c06642a1b8c8f4a48882e5641ed119295", 0x32, 0x2}]) 03:35:10 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x7d0c970d4084190f}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="0209000000000000000000000000000405000600000000000a00000000000004ff7f000000000000020000010000000000010000000000daa2fd89db11c70cac2fb953c1770002000100010000000000000200fd000005000500000000000a004872bbb6896209000055ef8b2698ffffbfff7710aa00fffe471700410000"], 0xffffffffffffff68}}, 0x8040) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x1) r1 = gettid() tkill(r1, 0x40020000000c) getpriority(0x2, r1) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/166, 0xa6) 03:35:10 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600), 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x4, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000300)="eb027658b73417fc65b666468ba2e33f9545ee42f2eb2a7e0179044274bdfbc23996489734dbcc6357b6a0e7faa7fb3626edd714fabeb4bab805538749b2b3acc2a092bac73a75704892f456b575bc44fa0ae6a523239edeb2dfedb6dfdb0fa00f3b7c751cf1e9f01345c953155824f904148032de39c5cae174a8ac202fe86604336c26d4c482be7db5723d4c782f59e30fdad7d2", 0x95, 0x1ff, 0x0, 0x2}]) 03:35:10 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB='debug_want_extri_isize=0x0000000000000300,\x00']) 03:35:10 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6", 0x100) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x7530}}) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000d80)=ANY=[@ANYBLOB="1c0000006afb243da4cbed8448acf38e6d500200001600000000d7a6e649d968086b35e5f2aadc8689ec72c3", @ANYRES16=r3, @ANYBLOB="000329bd7000ffdbdf250f00003e885d290459d16eeec8e404003f0000000578d7eb5a70e56813c4b3edb69b2c0126a63625bf08c0da93d6327fa4ddc0649fa0892b0a7f82b0521f55a9beb3d9ef5903e21b7a5a8f221332ffbcfa57adbe68071b9bce8ac7240003d32dd1c49ec79b5ab0b6e1278941c0cacb26fc546e04f0d630cdcfd2180374e2cf93565fe873a812c887b5b36ce9dde143b8105e2d8f69bb33ff0c81cc44cb6e0790817344d5ab36859dc6c9b3dedd4160eb261626a680061e30f705cc9db8b6ec90fdbe84b6555d9c3d52ed2f9b0bacc4f2c0f70bde7938f6d64f20d16fde5a65b046bca39a65723a36518ead7682ff4b27dd3b3e0ad41801f1f784e310154e1f19689eee1cdb240358a8e55876f325d130deea4e87bd9855fab8d8d682fb543678592daf89e3be82c3fbd2842943feb8782cd8d5756f6f59bf914cae3c373e0d68c3258c90833cce84363768ca60ebe1ac4979feb693a19350fcc57e5e159c87445fa464cbded86c6a4839b0e1ba8c06529c18111e141e0167edff9d78bb151041bcedbdb0"], 0x3}, 0x1, 0x0, 0x0, 0x800a5}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xfd, r3, 0x100, 0x70bd29, 0x25dfdbfe}, 0x84}}, 0x8800) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r3, 0x101, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x78b}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xc89f583964d7d9bf}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4882}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x100000008005) socketpair$unix(0x1, 0x1, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) 03:35:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}]) 03:35:10 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:10 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) write$P9_RMKDIR(r2, &(0x7f0000000000)={0x14, 0x49, 0x1, {0x20, 0x0, 0x3}}, 0x14) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) write$P9_RFSYNC(r3, &(0x7f0000000400)={0x7, 0x33, 0x1}, 0x7) lsetxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) utimes(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)={{r5, r6/1000+30000}}) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 1134.409844] EXT4-fs (sda1): Unrecognized mount option "debug_want_extri_isize=0x0000000000000300" or missing value [ 1134.594032] EXT4-fs (sda1): Unrecognized mount option "debug_want_extri_isize=0x0000000000000300" or missing value 03:35:11 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x7) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:35:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}]) 03:35:11 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x5}, 0x0, 0x200000, 0x0, 0x0, 0x1ffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f0000000200), 0x0) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='a', 0x1, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) r3 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, r2, &(0x7f0000000400)=ANY=[], 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$update(0x2, r4, &(0x7f0000000a80), 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000200), 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000200)='s', 0x1) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) pipe(&(0x7f0000000200)) keyctl$describe(0x6, 0x0, &(0x7f00000000c0)=""/83, 0x53) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) r6 = open(&(0x7f0000000140)='./file0\x00', 0x2, 0x21) r7 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r6, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r6, r7, 0x0, 0x666d) sendfile(r6, r7, 0x0, 0xa195) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f00000002c0)={0x0, 0x101, 0x9, 0x81, 0x80000001}, 0x14) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1135.656113] EXT4-fs (sda1): required extra inode space not available 03:35:12 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x7530}}) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000d80)=ANY=[@ANYBLOB="1c0000006afb243da4cbed8448acf38e6d500200001600000000d7a6e649d968086b35e5f2aadc8689ec72c3", @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x800a5}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xfd, r3, 0x100, 0x70bd29, 0x25dfdbfe}, 0x84}}, 0x8800) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r3, 0x101, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x78b}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xc89f583964d7d9bf}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4882}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x100000008005) socketpair$unix(0x1, 0x1, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 1135.715215] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:35:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}]) 03:35:12 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)='\x00', 0x1, 0x1) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) [ 1136.385019] EXT4-fs (sda1): required extra inode space not available [ 1136.388181] kauditd_printk_skb: 302 callbacks suppressed [ 1136.388191] audit: type=1400 audit(2000000112.730:56325): avc: denied { map } for pid=20148 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1136.430194] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1136.538931] audit: type=1400 audit(2000000112.780:56326): avc: denied { map } for pid=20148 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1136.690166] audit: type=1400 audit(2000000112.810:56327): avc: denied { map } for pid=20148 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1136.820810] audit: type=1400 audit(2000000112.830:56328): avc: denied { map } for pid=20148 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1136.900546] audit: type=1400 audit(2000000112.830:56329): avc: denied { map } for pid=20160 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1136.961806] audit: type=1400 audit(2000000112.840:56330): avc: denied { map } for pid=20160 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1136.994970] audit: type=1400 audit(2000000112.850:56331): avc: denied { map } for pid=20160 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1137.032958] audit: type=1400 audit(2000000112.860:56332): avc: denied { map } for pid=20160 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1137.066444] audit: type=1400 audit(2000000112.890:56333): avc: denied { map } for pid=20160 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1137.096519] audit: type=1400 audit(2000000112.900:56334): avc: denied { map } for pid=20160 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:17 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x100) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8400, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/404]) 03:35:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}]) 03:35:17 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x11, r1, 0x0) io_setup(0x7ff, &(0x7f0000000040)) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 03:35:17 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:35:17 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1141.404774] EXT4-fs (sda1): required extra inode space not available [ 1141.427328] kauditd_printk_skb: 609 callbacks suppressed [ 1141.427337] audit: type=1400 audit(2000000117.770:56944): avc: denied { map } for pid=20431 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, 0x0]) 03:35:17 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x100) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:17 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, 0x0) [ 1141.473134] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:35:17 executing program 2: r0 = gettid() tkill(r0, 0x40020000000c) r1 = syz_open_procfs(r0, &(0x7f0000000080)='\x00'/11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) 03:35:17 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000005,mode=0000', @ANYRESDEC=r0, @ANYBLOB="2c00abb17f36a088877caf3356ff0ad149a61ebbff239848f5958ca5ba8e7b4f1d28907e6dd2766a926ae61b71bbd4fe27c9e7af16f7"]) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x100, 0x0) write(0xffffffffffffffff, &(0x7f00000003c0), 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000680)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x5, 0x13, 0x11, 0x1, 0x9, 0xfff, 0x3, 0x63, 0x1}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socket$inet(0x2, 0x3, 0x1f) [ 1141.614249] audit: type=1400 audit(2000000117.770:56945): avc: denied { map } for pid=20431 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:18 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB='debug_want_extrk+l+ize=0x0000000000000300,\x00']) 03:35:18 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x180) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1141.743584] audit: type=1400 audit(2000000117.770:56946): avc: denied { map } for pid=20431 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1141.821015] audit: type=1400 audit(2000000117.880:56947): avc: denied { map } for pid=20433 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1141.920934] audit: type=1400 audit(2000000117.880:56948): avc: denied { map } for pid=20433 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1142.021895] audit: type=1400 audit(2000000117.900:56949): avc: denied { map } for pid=20433 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:18 executing program 2: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r4, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) r5 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r6, 0x1, 0x0, 0x1000f4) getresuid(&(0x7f0000004180), 0x0, 0x0) io_setup(0x7f, &(0x7f0000000000)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r8) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r9, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x12f}]) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80880, 0x0) io_cancel(r9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0x8001, r5, &(0x7f0000000180)="4782884afe95e6e6b9991525232a4c0689613a3298cf8532ccdb13ef7f7b08cb6604e1474a3d337f04d879c7f3db5650819a887a08ab305504ec984cf6b354d65f0390b3009022bcb7fd889ebe4094b57f573bd7c6ce825ced842609d6829890534be4d54895f94f384f1c0b1af05b717944e6280c61c3db47fe053fcb664398dc99e01896ec2e18c4688446919d742fb0d64f06df199f631185b8b5510fae9f9945850cf38069a44f22f3e031ba8c", 0xaf, 0x7ff, 0x0, 0x1, r10}, &(0x7f0000000300)) io_submit(r7, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) [ 1142.136458] audit: type=1400 audit(2000000117.900:56950): avc: denied { map } for pid=20433 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, 0x0]) [ 1142.286882] audit: type=1400 audit(2000000117.910:56951): avc: denied { map } for pid=20433 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1142.424707] audit: type=1400 audit(2000000117.920:56952): avc: denied { map } for pid=20433 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1142.455052] EXT4-fs (sda1): re-mounted. Opts: 03:35:18 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, 0x0) [ 1142.583863] audit: type=1400 audit(2000000117.920:56953): avc: denied { map } for pid=20433 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:19 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x400, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1000}, 0x1c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2d9, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0xffffffffffffff9a) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) [ 1142.683436] EXT4-fs (sda1): Unrecognized mount option "debug_want_extrk+l+ize=0x0000000000000300" or missing value [ 1142.855144] EXT4-fs (sda1): Unrecognized mount option "debug_want_extrk+l+ize=0x0000000000000300" or missing value 03:35:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, 0x0]) 03:35:19 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) chroot(&(0x7f0000000040)='./file0/file0\x00') lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:devpts_t:s0\x00', 0x1e, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x384424, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1}}]}) socketpair(0x3, 0x5, 0x9, &(0x7f0000000200)) [ 1143.236760] EXT4-fs (sda1): re-mounted. Opts: 03:35:19 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) write$apparmor_current(r0, &(0x7f0000000000)=@profile={'stack ', 'cwd/..\x00\x00\xd8sY\x86W\xb43K\x88\x16\xac\xeb\xdf\xf1\x90\x06E\xe0)@\x05A\a\xcb\"\x89t\xd5L)\x82\xdd*8\x02\xb0D\x9do\x05\x1a\xc1\"\x05\x00G|\x83M\x8e<\xb8\xed;F\xaf\x12\xe4RKa]%\x8b]\xba\x87G\xda\xf1\xdf\xf5\x19j\x13\xfb\xa2\x8dz\x16\xb6n\x81~9\x8bF\t\f0\xd0R\xe1{\xcf\xb7\x00\xd0\x18\xc5}\xc5\x03\xdd\x98\xb8\b$\xdf\xf5\xd6j!.\xa1\xc9\xa3\x1c\xe9\xf16\'$\x89F\xb0\xc9\xa4\x1d\xae\x96\xb7\x12\xb8\x86\x93Nbv2\x9dH\xf1B=y\xfa\x17\xd0\x85\x14\xd2\x13\xb36\xb9\xa5=\x9a\xcd\xe0\xd5R\xe0\xfe\x8e(\xce\x8as\xba\xe9RE\x1a7D\x8f\xc2\x80\x84(\xcc\xa3\xd4\x00Ch\xf3\xe1\xa5\x97\xf5;,\x98#\xc7;mS4\x83Pb\x8f\xeb@`0qG\x9f\bF\x02\xce\x96-\xb5\x0f\x95\xf9y\xea\xef\f\xc7\xd3\xb8\x9db\xc2\xbc\x83r\x147\xf1\xe2\xed6~lq\xea\xc4\xe3\xad\xf7(x\xb6\xb9_\xa4^\xb2\x0f\x01DY\x9a\x15j\xed[,\xb9\xdc\x15X}\xf6\xfacg\x1es\x83\xcbnu\xe0tJW\x8cF\xb9\x95?fW \r)K\xcd\x16\x83\xa6\xc2q\xf9\xcb\x89.\x94\xb5=o\xd4\xedj{\xe1\x03\xc6o>\xc6\xf4\xfe5>\xe0P\xe4\xebjM\xb0ZtV\xbeiyk\b*\\\xbb\xfb#\xb4l\t\xac\x00'}, 0x16d) syz_open_procfs(0x0, &(0x7f0000000280)='cwd/..\x00\x00\xd8sY\x86W\xb43K\x88\x16\xac\xeb\xdf\xf1\x90\x06E\xe0)@\x05A\a\xcb\"\x89t\xd5L)\x82\xdd*8\x02\xb0D\x9do\x05\x1a\xc1\"\x05\x00G|\x83M\x8e<\xb8\xed;F\xaf\x12\xe4RKa]%\x8b]\xba\x87G\xda\xf1\xdf\xf5\x19j\x13\xfb\xa2\x8dz\x16\xb6n\x81~9\x8bF\t\f0\xd0R\xe1{\xcf\xb7\x00\xd0\x18\xc5}\xc5\x03\xdd\x98\xb8\b$\xdf\xf5\xd6j!.\xa1\xc9\xa3\x1c\xe9\xf16\'$\x89F\xb0\xc9\xa4\x1d\xae\x96\xb7\x12\xb8\x86\x93Nbv2\x9dH\xf1B=y\xfa\x17\xd0\x85\x14\xd2\x13\xb36\xb9\xa5=\x9a\xcd\xe0\xd5R\xe0\xfe\x8e(\xce\x8as\xba\xe9RE\x1a7D\x8f\xc2\x80\x84(\xcc\xa3\xd4\x00Ch\xf3\xe1\xa5\x97\xf5;,\x98#\xc7;mS4\x83Pb\x8f\xeb@`0qG\x9f\bF\x02\xce\x96-\xb5\x0f\x95\xf9y\xea\xef\f\xc7\xd3\xb8\x9db\xc2\xbc\x83r\x147\xf1\xe2\xed6~lq\xea\xc4\xe3\xad\xf7(x\xb6\xb9_\xa4^\xb2\x0f\x01DY\x9a\x15j\xed[,\xb9\xdc\x15X}\xf6\xfacg\x1es\x83\xcbnu\xe0tJW\x8cF\xb9\x95?fW \r)K\xcd\x16\x83\xa6\xc2q\xf9\xcb\x89.\x94\xb5=o\xd4\xedj{\xe1\x03\xc6o>\xc6\xf4\xfe5>\xe0P\xe4\xebjM\xb0ZtV\xbeiyk\b*\\\xbb\xfb#\xb4l\t\xac\x00'/374) 03:35:19 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, 0x0) 03:35:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}]) 03:35:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='mode=00000', @ANYRESDEC, @ANYBLOB="0dc8fe7e5437504c42d4977b650a1e0b7cc6051af92a74e739d8a1e569d83cbe99d509954b09b57b607837f5ae3d63fc33bacd7b11c374d2b5485b3248cf58467dd3a741db2354c767cedcae45f55961674d96d7c7cf736fac"]) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x21}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000680)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) lsetxattr$security_evm(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f00000002c0)=@v2={0x5, 0x2, 0x8, 0x2, 0x43, "13832b5870e1d12d57bdf640ee3dadf393d6952d79b13be9aeacfe58a82f73fae9e2ab28bdcdacb3c0243cbbc947b77360d079d8a9a33b5c2397c85dd60e5e166ed3f1"}, 0x4d, 0x3) fstat(r1, &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x9, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="ab5fb5801658751541575cd1b626d37e04d757ede8439cc64bd55ae01fff89a14cfb88c5197709328e7d9871914038183354c54052f5d28c0dee0252fdaa949e9e1825e9fa75811966014870db59e29b07de66874dd5234eaaa0a857e7906a42052507ab", 0x64, 0x8}], 0x2, &(0x7f00000003c0)={[{@norecovery='norecovery'}, {@dioread_nolock='dioread_nolock'}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@smackfshat={'smackfshat', 0x3d, 'bpf\x00'}}, {@hash='hash'}, {@fowner_eq={'fowner'}}, {@smackfsroot={'smackfsroot', 0x3d, 'bpf\x00'}}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 03:35:20 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)=0x3f) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='bpf\x00', 0x2040008, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x10001}}, {@mode={'mode', 0x3d, 0x6}}], [{@dont_hash='dont_hash'}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000600)=ANY=[@ANYBLOB="00020000000000004bcd83c2ebf6d71c9ab6d06442123898530fdbb85200419d5ba32c9ca69841ce1f311318f9141a76e3e12f0036384e88aae77058011d9bbe0350ffcfdd463419c5224e6f4c6e6ce6d659cef1a99263f0d28a844d435f448c13990e54e28ff5ae11764f82db2183abb1e400000000000000b5f9c996dcd0804b2d9c1acd39bfc58681ef47060d4b388b5c9875687e"], 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="000004000000000418db963bc5047b66b8ec9426a1ec206b"], 0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x255e5369c3aa3063) r3 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) r4 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000001c0)=r4) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') listen(r3, 0x9ae) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r5, 0x0, 0xa808) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@loopback, @in6=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000004c0)=0xfffffffffffffe9b) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) request_key(&(0x7f0000000440)='.dead\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) [ 1143.893896] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000001, [ 1144.219857] EXT4-fs (sda1): re-mounted. Opts: [ 1144.367550] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000001, [ 1146.435172] kauditd_printk_skb: 368 callbacks suppressed [ 1146.435185] audit: type=1400 audit(2000000122.780:57322): avc: denied { map } for pid=20582 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.465008] audit: type=1400 audit(2000000122.800:57323): avc: denied { map } for pid=20582 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.488949] audit: type=1400 audit(2000000122.810:57324): avc: denied { map } for pid=20583 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.511276] audit: type=1400 audit(2000000122.810:57325): avc: denied { map } for pid=20583 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.534286] audit: type=1400 audit(2000000122.820:57326): avc: denied { map } for pid=20584 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.556658] audit: type=1400 audit(2000000122.820:57327): avc: denied { map } for pid=20584 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.579559] audit: type=1400 audit(2000000122.830:57328): avc: denied { map } for pid=20585 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.602711] audit: type=1400 audit(2000000122.830:57329): avc: denied { map } for pid=20585 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.625552] audit: type=1400 audit(2000000122.840:57330): avc: denied { map } for pid=20585 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1146.650449] audit: type=1400 audit(2000000122.850:57331): avc: denied { map } for pid=20586 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:25 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x180) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:25 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}]) 03:35:25 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', 'GPLvmnet0##cpusetppp0keyring\x00'}, &(0x7f0000000300)=""/158, 0x9e) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x101000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r1, 0x8, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x4000) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000001c0)) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000280)={[{@quota='quota'}, {@noblock_validity='\x00\x00\xe4\x00ock_validity'}], [{@smackfshat={'smackfshat', 0x3d, 'eth0vboxnet0),&\'\xbd'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}) 03:35:25 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, 0x0) 03:35:25 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000000000000941000000100018000000006574683a6c6f000013a8d70c19aa24ba53b3b3b45b7035f9358d0c7040cadf6d"], 0x2c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 03:35:25 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x180) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1149.520477] EXT4-fs (loop0): Can't read superblock on 2nd try [ 1149.526644] EXT4-fs (sda1): re-mounted. Opts: 03:35:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfff, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}]) [ 1149.580309] EXT4-fs (sda1): re-mounted. Opts: quota, 03:35:25 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, 0x0) 03:35:26 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:26 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'tunl0\x00', 0x4fff}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010005fba000000000bed000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r3, 0x0, 0x800000000024) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@ipv4, 0x0, 0x3c}, 0x0, @in6=@remote, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="ffffffffffffffff00010000000000000100000000000000", @ANYRES32, @ANYBLOB="000000005f0000000000000000000000000000000000000000006d125741794fd4cde7e50aaab62b8d25953f000000fc4d6511f73b732845976b01e96e6811b5c1ab09c5133c75a1e2d2b18fc3103414fbd006d4bdd9cf000007560a4932b117c0fedc623a8f4639313e8106ccf5f810926a6f6e7e97d11a333fda9a8377f2308c5b48f5dc9f746d11013bfee8b4f2dd65c7afe3906224ba09e6c2df8cfd5205a236a2d04e88e4aae5d7bdfc8879bb354c6a781f7f9138cd6981c27b2b120c0fed0885e103a4ea02a056"]) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, 0xffffffffffffffff) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\a\x00', @ANYRES16, @ANYBLOB], 0x3}}, 0x8001) 03:35:26 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1c0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:26 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x5) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:35:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}]) 03:35:26 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, 0x0) [ 1150.567147] EXT4-fs (sda1): re-mounted. Opts: 03:35:27 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:27 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}]) 03:35:27 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) [ 1151.441174] kauditd_printk_skb: 439 callbacks suppressed [ 1151.441183] audit: type=1400 audit(2000000127.790:57771): avc: denied { map } for pid=20807 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1151.494403] EXT4-fs (sda1): re-mounted. Opts: 03:35:27 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) write$cgroup_type(r0, &(0x7f0000000100)='threaded\x00', 0x9) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2e2f66696c65308c2d40a6c55ae31eb1d2c8e482eb9ba8"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1ad, 0x0, 0x900026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) open(&(0x7f0000000040)='./file0\x00', 0x44001, 0x28) [ 1151.643120] audit: type=1400 audit(2000000127.800:57772): avc: denied { map } for pid=20807 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1151.825520] audit: type=1400 audit(2000000127.830:57773): avc: denied { map } for pid=20809 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}]) [ 1152.046412] EXT4-fs (sda1): re-mounted. Opts: [ 1152.050130] audit: type=1400 audit(2000000127.850:57774): avc: denied { map } for pid=20809 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:28 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) 03:35:28 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1152.290103] audit: type=1400 audit(2000000127.860:57775): avc: denied { map } for pid=20807 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1152.390779] audit: type=1400 audit(2000000127.890:57776): avc: denied { map } for pid=20809 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1152.525792] audit: type=1400 audit(2000000127.910:57777): avc: denied { map } for pid=20807 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1152.661469] audit: type=1400 audit(2000000127.910:57778): avc: denied { map } for pid=20807 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1152.796372] audit: type=1400 audit(2000000127.950:57779): avc: denied { map } for pid=20809 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1152.949182] audit: type=1400 audit(2000000127.960:57780): avc: denied { map } for pid=20807 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.112935] kauditd_printk_skb: 611 callbacks suppressed [ 1157.112944] audit: type=1400 audit(2000000133.460:58392): avc: denied { map } for pid=21076 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.141960] audit: type=1400 audit(2000000133.460:58393): avc: denied { map } for pid=21076 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.434295] audit: type=1400 audit(2000000133.780:58394): avc: denied { map } for pid=21077 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.458340] audit: type=1400 audit(2000000133.790:58395): avc: denied { map } for pid=21077 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.489891] audit: type=1400 audit(2000000133.830:58396): avc: denied { map } for pid=21079 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.522602] audit: type=1400 audit(2000000133.860:58397): avc: denied { map } for pid=21079 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.549091] audit: type=1400 audit(2000000133.860:58398): avc: denied { map } for pid=21079 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb3cc0629dfc910c1fed", 0x10, 0xb7, 0x0, 0x2}]) 03:35:33 executing program 2: open(0x0, 0x40c2, 0x0) 03:35:33 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) r2 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000d80)=ANY=[@ANYBLOB="1c0000006afb243da4cbed8448acf38e6d500200001600000000d7a6e649d968086b35e5f2aadc8689ec72c3", @ANYRES16=r2, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x800a5}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xfd, r2, 0x100, 0x70bd29, 0x25dfdbfe}, 0x84}}, 0x8800) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x98, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffc}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="5222c1d0b510da746ca4ff9afe4905a6"}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x20040082) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x40014, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:33 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:33 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) socketpair(0x76796a7489823ff1, 0x800, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000d80)=ANY=[@ANYBLOB="1c0000006afb243da4cbed8448acf38e6d500200001600000000d7a6e649d968086b35e5f2aadc8689ec72c3", @ANYRES16=r1, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x800a5}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xfd, r1, 0x100, 0x70bd29, 0x25dfdbfe}, 0x84}}, 0x8800) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000100}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x108, r1, 0x30a, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xd60}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x46}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x33}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000340)) 03:35:33 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1c0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1157.573327] audit: type=1400 audit(2000000133.860:58399): avc: denied { map } for pid=21079 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:34 executing program 2: open(0x0, 0x40c2, 0x0) [ 1157.704910] EXT4-fs (sda1): required extra inode space not available [ 1157.731290] audit: type=1400 audit(2000000134.080:58400): avc: denied { create } for pid=21085 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1157.751452] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:35:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0, 0x0, 0xb7, 0x0, 0x2}]) 03:35:34 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1c0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1157.800509] EXT4-fs (sda1): re-mounted. Opts: 03:35:34 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) 03:35:34 executing program 2: open(0x0, 0x40c2, 0x0) [ 1157.943368] audit: type=1400 audit(2000000134.100:58401): avc: denied { write } for pid=21085 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1158.078980] EXT4-fs (sda1): required extra inode space not available [ 1158.122969] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:35:34 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1e0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:34 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) mount(&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64=0x0], &(0x7f0000000180)='./file0\x00', 0x0, 0x1005004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f00000004c0)=ANY=[@ANYBLOB="64656275675f77616e745f65787472615f6973697a653d3078303030303030303030303030303330302c005a8fbf8e454c0c97c7c477d1af4ec91f9fcc305b56a1a099a04da6644edcf2278c7e16fb33ad94778383da9efd3fb22347ef92d42dd6fcd5fbdc5fbb0e13a666bdc5bc7c049ab2675e6cf9f8c653e14e62283734b5ddde598c35baed782ca9c2de8c40bc849ab13c86cc95ece9"]) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001800)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000800)=""/4096, 0x1000, 0x800, 0x7fffffff, 0x5e, 0x6, 0x1000}, 0x120) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f00000001c0)="60c35ed4881c56699340678ef72acaa45aae4ebc5d770466a387e2caba3ca56e108d1e034e38be24f04cd9", 0x2b, 0x6}, {&(0x7f0000000200)="97767e24e06834c7895ce3e78b85b9646c0d01a6d3312614efa1bea2cc5f48fefc9b4bfaa360ab4acc18dfb7", 0x2c, 0x805e}, {&(0x7f0000000300)="8a11efdb9b4da2ec2ab1fdecf45e5e39fa2ff8ed97b2041b0cedac1ee6d5535ea65c47ac80307c539855b081b8d397aa0ac1308ac0530761bdddcd100a93dcc6b1ae90489b6ac7d68687e6475a5b729d633376fe71015df1370b9963ff9639e058045e3f65bd3f05e9674a48a2bf65f80a454ed689d45a129176d4df281c00e4fe1337d26de0b8b1351e877eedf0f23beac2acad661f87a562268fc4865f4649af6eedd5ec02e6afed7501f39bf46b06cdc536c16bac5c3aa2cdc64c20652e16a7a58f43f5380ece32830866b7b09cde7471ac64585adc1ff495d9b64ba23dab8d9a1f1789f9cc60babc30b62d33841042b723d4", 0xf4, 0x400}], 0x1000000, &(0x7f0000000400)={[{@sysvgroups='sysvgroups'}, {@barrier_val={'barrier'}}, {@lazytime='lazytime'}], [{@smackfsdef={'smackfsdef', 0x3d, 'debug_want_extra_isize'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'usereth0#.lo'}}, {@fsuuid={'fsuuid', 0x3d, {[0x3a, 0x61, 0x33, 0x62, 0x34, 0x36, 0xbdb25e8fbdf6e228, 0x63], 0x2d, [0x64, 0x6c, 0x61, 0x35], 0x2d, [0x66, 0x37, 0x61, 0x34], 0x2d, [0x64, 0x56, 0x35, 0x73b1c525420bcf61], 0x2d, [0xb, 0x37, 0x64, 0x36, 0x54b115192b68d842, 0x63, 0x39, 0x38]}}}]}) 03:35:34 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '{'}, {0x20, ':trusted'}], 0xa, "b10cad51373b539e3778e3db94cc240ab928a25c80053c28961caef974e16e8d1ce0f8bab01f3c6caaadb2933054fdfa2ba2e98126399b1e3afb5a6815051014a4e4f1740fce7955fbe7353dc4ad5023fa4692753386afe5cd4f7975f5c7c628a6bb58b321ca751a9787b55a2f605ad0d01916f9a961ba06209f8cdecc49ad64183c3d85f82ba808ca6dc3dfd92d8b7af2373b6093e1e09d7fd357c66a38c019197f82bf81a32ab0c35734ed19c6a5467febe55c3db9c61e7b42105a88e26437f000c5ea53c2c8970ddd1e33a5ed"}, 0xe4) 03:35:35 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:35:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0, 0x0, 0xb7, 0x0, 0x2}]) 03:35:35 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) 03:35:35 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:35:35 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) fchdir(r0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) dup(r0) [ 1159.426235] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:35:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0, 0x0, 0xb7, 0x0, 0x2}]) 03:35:35 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1, 0x6, [@rand_addr=0x2, @rand_addr=0x10000, @multicast1, @broadcast, @local, @loopback]}, 0x28) getpeername$packet(r1, &(0x7f0000004980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000049c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000004a80)={&(0x7f0000004900)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000004a40)={&(0x7f0000004a00)=@newchain={0x30, 0x64, 0x4cad12ce79e341a5, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xfff3}, {0x3, 0xe}, {0x18, 0x3}}, [@TCA_RATE={0x8, 0x5, {0x6}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000170) r4 = gettid() tkill(r4, 0x40020000000c) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f00000000c0)={0x3, 0x44a16ddc080e3f3a, 0x401, 0x8, r4}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:36 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) 03:35:36 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 1162.127187] kauditd_printk_skb: 295 callbacks suppressed [ 1162.127194] audit: type=1400 audit(2000000138.470:58697): avc: denied { map } for pid=21221 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.155658] audit: type=1400 audit(2000000138.480:58698): avc: denied { map } for pid=21221 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.178521] audit: type=1400 audit(2000000138.490:58699): avc: denied { map } for pid=21222 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.202059] audit: type=1400 audit(2000000138.490:58700): avc: denied { map } for pid=21222 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.224966] audit: type=1400 audit(2000000138.500:58701): avc: denied { map } for pid=21223 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.247281] audit: type=1400 audit(2000000138.500:58702): avc: denied { map } for pid=21223 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.271472] audit: type=1400 audit(2000000138.510:58703): avc: denied { map } for pid=21224 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.293915] audit: type=1400 audit(2000000138.510:58704): avc: denied { map } for pid=21224 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.317821] audit: type=1400 audit(2000000138.530:58705): avc: denied { map } for pid=21225 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.340170] audit: type=1400 audit(2000000138.530:58706): avc: denied { map } for pid=21225 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:41 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1e0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:35:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100), 0x0, 0xb7, 0x0, 0x2}]) 03:35:41 executing program 3: setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-', 0x6}, 0x28, 0x2) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x61c000, 0x0) write$cgroup_int(r0, &(0x7f00000000c0)=0x26ec, 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x5, 0x1f8, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:35:41 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:41 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x100, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x0, [], [{0x401, 0x7, 0x1f, 0x1, 0x7fff, 0x80}, {0x200000, 0x100, 0x5, 0xcd2, 0xb7, 0x2}], [[], [], [], [], []]}) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2e2f66696c6530401f26866b87b34a4f4614c375dddef5e50ee813ebf88c8d0630e1367734378ec9afeaa1c152dd1dde03575c3a90dd056faf82ae95601cfb9979c7f392a53505dd9f3f50d909001ce08c58600a4319e80bc88a1578374a128196e4d7afa687393190c0640b9e41a6c7f1c6f6ee2a2e0fe7e7f1d6e969c12b4bac8d38467d819f4b0329d6a9bce41d461c0eefcd4ca0ff9431a37ef99e1d"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000500)={0x0, 0xfb, 0xa5, 0x2, 0x40, "eccfaeb149fe1fac7ef5cb05beb88c3b", "b0ed64d0719f561bf1e552f25cdb7c062b64cd21cdeb38eb4a544aaf863cd94b1b00a9121e735e536b17f58f093b7d69fb365ff206102c9d49f1025d2e6a3aea8dd053a196cce4c9acd22238742b6024a73f960ac2b941ef5161369d85596d1c3a45e908b5ce295d765b822616749aa2717943cea463c3a7f830ac008d049dee45e625d7f0b37ef66ad4581af911d994"}, 0xa5, 0x3) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) ioctl$FS_IOC_GETFLAGS(r6, 0x80086601, &(0x7f00000000c0)) r7 = dup3(r0, r4, 0x100000) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000040)) 03:35:41 executing program 3: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffffffffe43, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'dewug_w\x00\x00t_extra_isize', 0x3d, 0x300}}]}) 03:35:41 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1e0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100), 0x0, 0xb7, 0x0, 0x2}]) 03:35:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:35:41 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:42 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1f0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:42 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB='jqfmt9vfsold,\x00']) 03:35:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:35:42 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f00000001c0)=ANY=[@ANYBLOB="44656275675f77616e65787472615f6973697a653d307830303030303030303030303030e902302c001ccc4198ff30002162d0e8dba51d26ca593b31a79ab9d671b592d72de93e7706f8c87a3257590aca0ef22f9cbd7e29bcda4e"]) 03:35:42 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100), 0x0, 0xb7, 0x0, 0x2}]) [ 1166.407127] EXT4-fs (sda1): Unrecognized mount option "jqfmt9vfsold" or missing value [ 1166.576029] EXT4-fs (sda1): Unrecognized mount option "jqfmt9vfsold" or missing value 03:35:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:35:43 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) 03:35:43 executing program 0: open(0x0, 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41bcb3c", 0x8, 0xb7, 0x0, 0x2}]) [ 1166.920286] EXT4-fs (sda1): Unrecognized mount option "Debug_wanextra_isize=0x0000000000000é0" or missing value 03:35:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) [ 1167.131651] EXT4-fs (sda1): Unrecognized mount option "Debug_wanextra_isize=0x0000000000000é0" or missing value [ 1167.142232] kauditd_printk_skb: 416 callbacks suppressed [ 1167.142240] audit: type=1400 audit(2000000143.480:59123): avc: denied { map } for pid=21464 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.312781] audit: type=1400 audit(2000000143.480:59124): avc: denied { map } for pid=21464 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:43 executing program 3: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x400, 0xff, 0x40, 0x1}, {0x4, 0x40, 0xb8, 0x1}, {0x2f, 0xe5, 0x3f, 0x5}]}) [ 1167.432823] audit: type=1400 audit(2000000143.500:59125): avc: denied { map } for pid=21464 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.580121] audit: type=1400 audit(2000000143.500:59126): avc: denied { map } for pid=21464 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.696737] audit: type=1400 audit(2000000143.540:59127): avc: denied { map } for pid=21464 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.784380] audit: type=1400 audit(2000000143.580:59128): avc: denied { map } for pid=21464 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.890224] audit: type=1400 audit(2000000143.590:59129): avc: denied { map } for pid=21464 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.985035] audit: type=1400 audit(2000000143.630:59130): avc: denied { map } for pid=21464 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1168.042894] audit: type=1400 audit(2000000143.630:59131): avc: denied { map } for pid=21467 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1168.104646] EXT4-fs (sda1): required extra inode space not available [ 1168.130587] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1168.161385] audit: type=1400 audit(2000000143.640:59132): avc: denied { map } for pid=21464 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.293382] kauditd_printk_skb: 611 callbacks suppressed [ 1172.293392] audit: type=1400 audit(2000000148.640:59744): avc: denied { map } for pid=21734 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.321198] audit: type=1400 audit(2000000148.640:59745): avc: denied { map } for pid=21734 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.614300] audit: type=1400 audit(2000000148.960:59746): avc: denied { map } for pid=21735 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.637160] audit: type=1400 audit(2000000148.960:59747): avc: denied { map } for pid=21735 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.666926] audit: type=1400 audit(2000000149.010:59748): avc: denied { map } for pid=21736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:49 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1", 0x1f0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100), 0x0, 0xb7, 0x0, 0x2}]) 03:35:49 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f00000001c0)) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffffffffe41, 0x0, 0x8000, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x23}}, {@obj_role={'obj_role', 0x3d, 'posix_acl_access/'}}, {@fowner_eq={'fowner', 0x3d, r0}}]}) 03:35:49 executing program 0: open(0x0, 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) 03:35:49 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) r2 = accept$unix(r0, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) sync_file_range(r2, 0x7, 0xffff, 0x4) getpeername$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000200)=0x10) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) prctl$PR_GET_FP_MODE(0x2e) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) [ 1172.717209] audit: type=1400 audit(2000000149.040:59749): avc: denied { map } for pid=21736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.755499] audit: type=1400 audit(2000000149.040:59750): avc: denied { map } for pid=21736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.820390] audit: type=1400 audit(2000000149.040:59751): avc: denied { map } for pid=21736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:49 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000280)='./file0\x00', 0x90) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x104026, &(0x7f00000001c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}], [{@uid_lt={'uid<', r2}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@dont_appraise='dont_appraise'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@obj_type={'obj_type', 0x3d, 'vmnet1'}}]}) 03:35:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) 03:35:49 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1f0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1172.848932] audit: type=1400 audit(2000000149.040:59752): avc: denied { map } for pid=21736 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.877056] audit: type=1400 audit(2000000149.040:59753): avc: denied { map } for pid=21736 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:49 executing program 0: open(0x0, 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100), 0x0, 0xb7, 0x0, 0x2}]) 03:35:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) [ 1173.110609] EXT4-fs (sda1): required extra inode space not available [ 1173.122255] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:35:49 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1f8) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:49 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) write$binfmt_elf32(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0xf9, 0x3, 0xd, 0x9, 0x8, 0x3, 0x3, 0x9, 0x22b, 0x38, 0x74, 0x101, 0x0, 0x20, 0x2, 0x3f, 0x1, 0x6}, [{0x60000000, 0x7, 0x2, 0x6, 0x9, 0x4, 0x80, 0x8001}], "5ff05f5a09c14788fa39c5ff98bb32d8597d417c1f0e30505c9f041f612826a8e10b3bf144fb8bc82a834c009f40b908304d184825a389ac2365954370618b8136fb924e9e124bdb8d76aa345778f0f2b00d6bae04ddb9cca818ba2d02e1e94a4de58652a67c3b0eacf7ee297c701b3ea677c9"}, 0xcb) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, 'em0cpusetem0@\\}\xf2em1'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, '.'}}, {@audit='audit'}, {@uid_gt={'uid>', r3}}]}) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7) [ 1173.418489] SELinux: security_context_str_to_sid(staff_u) failed for (dev sda1, type ext4) errno=-22 03:35:49 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100), 0x0, 0xb7, 0x0, 0x2}]) 03:35:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) 03:35:50 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1173.994319] EXT4-fs (sda1): Unrecognized mount option "obj_type=em0cpusetem0@\}òem1" or missing value [ 1174.183629] EXT4-fs (sda1): re-mounted. Opts: 03:35:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) [ 1174.344436] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:35:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272", 0x4, 0xb7, 0x0, 0x2}]) 03:35:50 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) fadvise64(r1, 0xf77, 0xffffffff80000001, 0x1) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:51 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:35:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272", 0x4, 0xb7, 0x0, 0x2}]) [ 1175.229376] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1175.397880] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1177.305620] kauditd_printk_skb: 265 callbacks suppressed [ 1177.305627] audit: type=1400 audit(2000000153.650:60019): avc: denied { map } for pid=21861 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.335412] audit: type=1400 audit(2000000153.660:60020): avc: denied { map } for pid=21861 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.360710] audit: type=1400 audit(2000000153.670:60021): avc: denied { map } for pid=21862 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.382925] audit: type=1400 audit(2000000153.670:60022): avc: denied { map } for pid=21862 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.405878] audit: type=1400 audit(2000000153.680:60023): avc: denied { map } for pid=21863 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.430088] audit: type=1400 audit(2000000153.680:60024): avc: denied { map } for pid=21863 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.452979] audit: type=1400 audit(2000000153.690:60025): avc: denied { map } for pid=21864 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.475332] audit: type=1400 audit(2000000153.690:60026): avc: denied { map } for pid=21864 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.500110] audit: type=1400 audit(2000000153.710:60027): avc: denied { map } for pid=21865 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.522350] audit: type=1400 audit(2000000153.710:60028): avc: denied { map } for pid=21865 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:56 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a", 0x1f8) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:56 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:35:56 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x0, 0x3}) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272", 0x4, 0xb7, 0x0, 0x2}]) 03:35:56 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xc0, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xb23cdd0c5b4668ec}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)={0x100, r2, 0x210, 0x70bd2d, 0x25dfdbfb, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}]}, 0x100}, 0x1, 0x0, 0x0, 0x80}, 0x41080) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) socketpair(0x10, 0x3, 0x4, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = gettid() tkill(r7, 0x40020000000c) r8 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r9 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r8, &(0x7f0000000600)="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", 0x200) sendfile(r8, r9, 0x0, 0x666d) sendfile(r8, r9, 0x0, 0xa195) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000800)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) r11 = getgid() r12 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r13 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r12, &(0x7f0000000600)="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", 0x200) sendfile(r12, r13, 0x0, 0x666d) sendfile(r12, r13, 0x0, 0xa195) ioctl$TIOCGPGRP(r12, 0x540f, &(0x7f0000000dc0)=0x0) r15 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r16 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r15, &(0x7f0000000600)="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", 0x200) sendfile(r15, r16, 0x0, 0x666d) sendfile(r15, r16, 0x0, 0xa195) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000e00)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000f00)=0xe8) r18 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r19, &(0x7f0000003480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) ioctl$sock_TIOCINQ(r19, 0x541b, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r22, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r22, 0x541b, &(0x7f0000000100)) r23 = socket$unix(0x1, 0x0, 0x0) bind$unix(r23, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) connect$unix(r23, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r23, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r23, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r23, 0x0, 0x0, 0xc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r26, 0x0) r27 = socket$unix(0x1, 0x2, 0x0) bind$unix(r27, 0x0, 0x0) connect$unix(r27, &(0x7f0000000140)=@file={0x3d5d8456ac458b37, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r27, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r27, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r27, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) sendmsg$unix(r19, &(0x7f0000000e80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="face851b3a499bb8cb0ad66684b5fbf28f0f5f7f699c373ec437cd19e4c92f437be066a66e38a0aafeceac42d67e74b9d3f1efeca4350e19484790dbedaad35cb12538c303003937cc92097da96db2e0912b951c3d483ca26988d1f61754922736afea99af15f693509e43eae2ec954c18590f27cc79e6805a2c1648f67dce068ee9ac5f336b7f46cab1d6956849904e7b1f", 0x92}, {0x0}, {&(0x7f0000000200)="d1cf1095f1dbf97abf66f8d6a25d942e3dcbc363fa09d2be2f9933d3e60be4", 0x1f}, {&(0x7f00000006c0)="c9e60d0469bbddef03387ac6827ecc3069dcc77f97dd65f690ca3fc21736c4ff8d13ec7d277a8ac548a89b23d8d895a4d1e643f9a33b8af9b9390d2a1448969f91e26daaa12e93380c2626cde597b3ffd063a93e2d", 0x55}, {0x0}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r20, r21}}}, @rights={{0x1c, 0x1, 0x1, [r22, r23, r18]}}, @cred={{0x1c, 0x1, 0x2, {r24, r25}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r26}}}, @rights={{0x18, 0x1, 0x1, [r27, 0xffffffffffffffff]}}], 0x98, 0x40000044}, 0x8000) r28 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r29, &(0x7f0000003480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) ioctl$sock_TIOCINQ(r29, 0x541b, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r32, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r32, 0x541b, &(0x7f0000000100)) r33 = socket$unix(0x1, 0x0, 0x0) bind$unix(r33, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) connect$unix(r33, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r33, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r33, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r33, 0x0, 0x0, 0xc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r36, 0x0) r37 = socket$unix(0x1, 0x2, 0x0) bind$unix(r37, 0x0, 0x0) connect$unix(r37, &(0x7f0000000140)=@file={0x3d5d8456ac458b37, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r37, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r37, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r37, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) sendmsg$unix(r29, &(0x7f0000000e80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="face851b3a499bb8cb0ad66684b5fbf28f0f5f7f699c373ec437cd19e4c92f437be066a66e38a0aafeceac42d67e74b9d3f1efeca4350e19484790dbedaad35cb12538c303003937cc92097da96db2e0912b951c3d483ca26988d1f61754922736afea99af15f693509e43eae2ec954c18590f27cc79e6805a2c1648f67dce068ee9ac5f336b7f46cab1d6956849904e7b1f", 0x92}, {0x0}, {&(0x7f0000000200)="d1cf1095f1dbf97abf66f8d6a25d942e3dcbc363fa09d2be2f9933d3e60be4", 0x1f}, {&(0x7f00000006c0)="c9e60d0469bbddef03387ac6827ecc3069dcc77f97dd65f690ca3fc21736c4ff8d13ec7d277a8ac548a89b23d8d895a4d1e643f9a33b8af9b9390d2a1448969f91e26daaa12e93380c2626cde597b3ffd063a93e2d", 0x55}, {0x0}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r30, r31}}}, @rights={{0x1c, 0x1, 0x1, [r32, r33, r28]}}, @cred={{0x1c, 0x1, 0x2, {r34, r35}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r36}}}, @rights={{0x18, 0x1, 0x1, [r37, 0xffffffffffffffff]}}], 0x98, 0x40000044}, 0x8000) getgroups(0x8, &(0x7f0000000f40)=[0xee00, 0xee01, 0x0, r21, 0xffffffffffffffff, r31, 0xee01, 0xee00]) r39 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r40 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r39, &(0x7f0000000600)="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", 0x200) sendfile(r39, r40, 0x0, 0x666d) sendfile(r39, r40, 0x0, 0xa195) r41 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r42 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r41, &(0x7f0000000600)="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", 0x200) sendfile(r41, r42, 0x0, 0x666d) sendfile(r41, r42, 0x0, 0xa195) r43 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r44 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r43, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r43, r44, 0x0, 0x666d) sendfile(r43, r44, 0x0, 0xa195) r45 = socket$inet6_udplite(0xa, 0x2, 0x88) r46 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r47 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r46, &(0x7f0000000600)="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", 0x200) sendfile(r46, r47, 0x0, 0x666d) sendfile(r46, r47, 0x0, 0xa195) r48 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r49 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r48, &(0x7f0000000600)="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", 0x200) sendfile(r48, r49, 0x0, 0x666d) sendfile(r48, r49, 0x0, 0xa195) r50 = socket$inet_tcp(0x2, 0x1, 0x0) r51 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r52 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r51, &(0x7f0000000600)="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", 0x200) sendfile(r51, r52, 0x0, 0x666d) sendfile(r51, r52, 0x0, 0xa195) r53 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r54 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r53, &(0x7f0000000600)="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", 0x200) sendfile(r53, r54, 0x0, 0x666d) sendfile(r53, r54, 0x0, 0xa195) r55 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r56 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r55, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r55, r56, 0x0, 0x666d) sendfile(r55, r56, 0x0, 0xa195) r57 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r58 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r57, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r57, r58, 0x0, 0x666d) sendfile(r57, r58, 0x0, 0xa195) r59 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r60 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r59, &(0x7f0000000600)="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", 0x200) sendfile(r59, r60, 0x0, 0x666d) sendfile(r59, r60, 0x0, 0xa195) r61 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r62 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r61, &(0x7f0000000600)="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", 0x200) sendfile(r61, r62, 0x0, 0x666d) sendfile(r61, r62, 0x0, 0xa195) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r61, 0xc0502100, &(0x7f0000001280)={0x0, 0x0}) r64 = geteuid() r65 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r66, &(0x7f0000003480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) ioctl$sock_TIOCINQ(r66, 0x541b, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r69, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r69, 0x541b, &(0x7f0000000100)) r70 = socket$unix(0x1, 0x0, 0x0) bind$unix(r70, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) connect$unix(r70, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r70, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r70, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r70, 0x0, 0x0, 0xc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r73, 0x0) r74 = socket$unix(0x1, 0x2, 0x0) bind$unix(r74, 0x0, 0x0) connect$unix(r74, &(0x7f0000000140)=@file={0x3d5d8456ac458b37, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r74, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r74, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r74, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) sendmsg$unix(r66, &(0x7f0000000e80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="face851b3a499bb8cb0ad66684b5fbf28f0f5f7f699c373ec437cd19e4c92f437be066a66e38a0aafeceac42d67e74b9d3f1efeca4350e19484790dbedaad35cb12538c303003937cc92097da96db2e0912b951c3d483ca26988d1f61754922736afea99af15f693509e43eae2ec954c18590f27cc79e6805a2c1648f67dce068ee9ac5f336b7f46cab1d6956849904e7b1f", 0x92}, {0x0}, {&(0x7f0000000200)="d1cf1095f1dbf97abf66f8d6a25d942e3dcbc363fa09d2be2f9933d3e60be4", 0x1f}, {&(0x7f00000006c0)="c9e60d0469bbddef03387ac6827ecc3069dcc77f97dd65f690ca3fc21736c4ff8d13ec7d277a8ac548a89b23d8d895a4d1e643f9a33b8af9b9390d2a1448969f91e26daaa12e93380c2626cde597b3ffd063a93e2d", 0x55}, {0x0}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r67, r68}}}, @rights={{0x1c, 0x1, 0x1, [r69, r70, r65]}}, @cred={{0x1c, 0x1, 0x2, {r71, r72}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r73}}}, @rights={{0x18, 0x1, 0x1, [r74, 0xffffffffffffffff]}}], 0x98, 0x40000044}, 0x8000) r75 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r76 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r75, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r75, r76, 0x0, 0x666d) sendfile(r75, r76, 0x0, 0xa195) lstat(&(0x7f0000001300)='./file0\x00', &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r5, &(0x7f0000002480)=[{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000380)="3b85c614", 0x4}, {&(0x7f00000003c0)="4bce69b848445ce0b8febadb4066b3b303c26173b54f50c9564109bfc2937ec5e4bcb4deeeafe468f60f9c711d5ec1c775493abe2cce322045362034ee95a247ec2b69fec3136e21df36891cf49353cb597418384a6f627ce0e87e4d67126a89744598", 0x63}], 0x2, &(0x7f00000005c0)=[@rights={{0x18, 0x1, 0x1, [r6, r4]}}, @cred={{0x1c, 0x1, 0x2, {r7, r10, r11}}}], 0x38, 0x4}, {&(0x7f0000000900)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000980)="282f02e2d3ce6f590c42a600d797cdddcd168c9c58ae26d7defab10662f9d04d14a28f752cb826a0b67cd0d7e7306ea58b1f2a46736c00a4b1511994b13d54babdf39c89b413cd49eb45898dc4c5482e852fc877cecf268f66c927422f6095ab7adaabde776fdeeb", 0x68}, {&(0x7f0000001380)="ac08e02c65a1338cb4c1095be0fcb4a896d95a4e40fc975f3bbff3fbd5363b9efa45074de98f94bd0f59e09876f83c12852b842b2b03e4f0bcae531b1cf57b24f225c3444e7b407fbdfb6f9e68589f74fe745dd30ce8569c9abd919d87ab134f94f1803f6858133aedf45750809071165457f235b1264f6461be746eaa5a6e7744e62bf481a66f5693a2a79820e1e47512044ffe3aafc43ffa6a829ce216bb546b32facb6886634e061965eda22715f3a6ce92f5acba324dbbd559bef37e34b33c83bc325884c18bd2a996e2776b5d5b1404d926d9396869d2cbb68ff3d60c036201ea61919135c2ae2684d3d7ffc5e4ded92f51b145e1fabb87c2a60a0d53fac9a042b2cae81982d1f385e82e318d842280cfed359656f684e3f637e65988926b73b1dd0227accdd70566fde62d9eaa066afd18c7fa94d3d67f6747c6eb3e2f7fc0f3757335e7f040086cc9f6ded5861eda2d84cd96a9d3810496d3a39ae417ba1125a71ee53228ad8f65b32ccf8fad0a58fb24fe66af3af9e94a972351029d20331917891709ae4ac3965ed610d78a1d337bcf7d7bdfb3153aed0965a6d666a9e0b355a5eaf6381be2836dc40bef653886e38097f876a9a769a84b4337fd0e70c066ef7d5d48148122fafa1343d09f90034daa840e943b4d76006a26269b0b2c1dfeacafa1def7ef6394347c729c5175676b5289c09418957c96dee01aa6c5bc76a70c1ec7d17d5269ae9a8505be5a5cc3718fc76c778fae8a19259eaa02656c52ee757854c09d6af0e39ae838731d44a9c76b9af6c33681ead2b0e82bb72b6fccb22b9ef6c30ba2a5a5f7ae8f13805fe0569ff04ee0c567b0e658ca744a828fff06932501235e958a5f77d057427bf1146066a3b6446de7a08a3ae9686e8af311a6e4b39224be93da81c0905f6487c8a55f451a6d07c55d9ddeb2545135cab0e177ca4abdfb9caf84d85661041bd4db07b4bf3efc8791f6ad800a19d85b8357b8c54cd8aa33639dfeb928dcb54d526563f61816ccc2aad2f590a55482bb1486bbf7cf51f46528ddf40e214b0a9cad0f7b1b395b73e0d8627100774a38c708837033d4d9ed0f9a31fa6a3806f60e4d944e6b53c651148c53ac28a118b9b9fadd18f5ca1488f74a39446d9190fc06166a4578c7afe1be92692080d671f53bd51f2e0a59fdd0b8725c06beaaafae1096059e1e63707ff17e92654caf040189dd20a192208809d0b2b8ec98158958f96c035fed3b297cf8a7418bc146d158eaaeeea2f1628d50831b734e9e7068871274f5f02a6ede4866fa3efb2147acce8fe448bc1bd27a015d48cdca67d5902ad854a4dd654461f3917ca146587cf1461cd5e601aed2a4702534205b60acdaa98665dc52ddc3b287e42c4ce796dd7adf526e857f7b7f2f207b0d6d685467b52c0cd847028b744b30a87a62cbfe73c82170458ec2d0c12352acfcbbe5dfc4823a9dff8e66f1cacd5096b704da46ad6f03047f0dfb3ee8b10f6595af4ea63be5e85949fd2bc37ad8a8c445c039ae93b82b07323368f128698dd8adf6fd55fd490d46b13d8b81941a92e84deff3e59ec45674cc0cacab3c2b42fd44e841ffd1b5c25ce5a091315a8dff997e3cd11237c08bbe66bff1d4668fe91962972425aa7e44762e57b50e8c585186050645ff869b20b38141a81bc865a15308a0e3f2cfd6bf4feec49f5c0b205bc7c4f8b422324adaac6753aa708b468452260700bd28d433c10dea47675189e8de0dd5ab9649144834797783369156d6467807cea8263ddf671b13e4c596ec36e5d9ab4c1aa8b8eaf6bdbabfccd53246cd57ff3b226078e3f64c4c42810ebeaae4a2a93bf0f99ddebdf5b753b3c97400b433b5bd032362bd5669e2041355b573b9378a3ff3fbbda0fddf05f5fa146f3ed1a23acf5bfa9d54d916ae4fa14d9c49663b1ff6759f351116ca2270605b81292c1a47592ceb94d3a3081a7700718e40cf51f010e3188b6ebd39fe965b45e3844ad2c3a963a233c7a228ab38b984474e7b838218fb97a0b91a965d620e0b5c11c3e30cc4f0ae35acb6b91f5f0c8c485620e56dec93f7d15f9d6f9057bfe415f10d7fb191c9ac8a4447afc740e699073e2b93b2c8468e81bee2b0afdcaaf5a10d04515c731bffd127bd2969a1f115d9bcd08473281654f5ccc3afd82eb73f984a7eb3a31222aad2903e9b9a1f042ec9c4c36e9e57b713a794b9dd4dfa15267fe3df04fe09e8cba223439a4795176551592d011b4c9b7d02b52bdbe95d834275308027a0dea6a928ca7945e1906a454517b8336d3943231c0e9967d97e11c59f48452121ffbbf7d9d210a431133a2dab18e031f48e079bef9852b0035960b181f3d57e9f974cc801e5b7bb65c11034eea7ca0b0b723c1bce3af9d5919d60221120fb7180d71545a5e66b5721def6299d455eb2d6f162b504a978c265cb9c38cf459a08276dbe48ba2d453d01c1b24ce4ae6f4a51c3c88a3848aa06a19ca6758321a0c3b8d773c5d3f7ec3966bd68034628130a975bfab71f85a8fed2856a56b72cc5706866f8ec1444bb884e3439d89b5f0f7768c6446c857ff892460aaa4ab21bebca6f5c7f8b4769a1a325b44c9e0e5ef0b4b09453fd13d69cba1d7e266d3c98d135cfc372d85d69d03ec0aef470795b092b73ba875f941f873304ae669d8c126fb86f9099bc06135ae5a95a8dcf7084ebee5d11f858d697c7c8f7e4ddaf2e5f4b96eff7b16a59450235b517ae15243a2b60be93930a68fec4bcb060d67f73bf4a04da676cda6fa851a82532eafc6c785b1b68f5774a56bbb18dc8813a7852ca5fa60c02dcf788a8b1933a663c2a789e968b190a854ab6786743d35d0795d12f8033f3b466fc51da71563f5b20eec3ffa423dcb46f137fee8d4a9b75c9c514090b1fce880a2f63d53ec85ede11b2add712325dfb5eca4cb1b34be00e194fc9a8dfc0083273cfb0cc2ec0d32ca4b288deaf9d93b6eb00492919517fcfaaeeac13b04c28cb932424d000055c0f94002a0d1d455de51867a52019a86c77ee8cbbf80fad3e95645af0d2bb225309dc306150800d0f26a34050bff1a7e0be810db34f88eaf846dd9b7b19320f5d0f492e095c6067e28a75b31f8421ec92385a2446a561cb3f643cbcd5e244a64d1aa61b962bf3b83d1e8a88e8080f2a2637f88a45b19a7c1b23ed511d675fe2a002aee69033fb5334139ecc90da59b5ed9a17be1e4d1c362365d3862f6e33cd05e492f53d9b3a8ca530d035374bb002f39f7e320ebf7124fbf1fa14faea46ae29929e670a72bce211313d0fd8dc97a493fa16e1f748e0399f1c4418f792efb50d925bfefe39f23183d1bcab185bd3d05c79a228d329a26775067bbff836637f0fe7d2f016bf1d48a72283b3aacdcfd38ac6664b2def7e85ab56d22dab60a968dda65089ebca6f77738302ead9e965012dfe538f4b4d1af06a8fb1eba9f263165c2d5d906ca303387f4b43f07217d4508d847d86c7db91302b5563d21defc2e19a87a9d3804fd0d586c7c4d0db5d154955b3b8322d06e46248d7da919c43eeb985b407680e31a0f78e137bc3e9e52f57c67db2dd45dcc9ea4be67df711920f0ecd9caf3cf84aaedac9b7703c85f42be32ddb6305b587a015f3110a3fdd88f3d635de9ceaaa69dbd91a733c51cfab770e30630af0316919c8e4ee29c5b78a70d10ad0258e7f8ed3f9442466fb905fd6c21215272c2d7f6ce6e6e9ce0d8689b1122b7c676627774d7e1be41afaad8580fff4d8ace6fa22dfecd0b252e788e8952db19c7913223f22db8109201fde5fac8976f6f51932cb8a78a9e652b2b608a9382dd2b0dc6dfbeaaea6558ffb14c343e2e5061b09a31cf02c04137067c0731d305f2185a793e420ef1643bc08f336982e59891364cc8ffd0f6aeb21b4a3967f685232e31982ae14f388ec182b518deacf7706c2bab7971b983d6baff6dd1bf48d6610acbb39a643ac75c09a9d7b327ea24727c0f5e15a16ed3f0673451ec99b78fed3f7fa30a83fde337e9af348ecb21a0d2d69e19b44e5f6fc08c45ab82e8e1711df499a242dbd4edc83bab9a010405d6c228e44dc9cc4f75f17ab9669c32cdba6a40a64c8670b1116b61e0559368ba5b2a9ae7525989c487016f814e5f434a991933fb659b604f01e0dc12ac3208c2927c87d705b0279c1f8c52218b1cd14b91bd1f5f35224fc0e4a66926b0e8ad905b2cffa830510625fb421148732784353cab8f732c9c065984e88c61a349046a7f7c66db297116acc45e87068689d9e76d4a912ff2e3c0771926cd5fb9d0897ad67a5c22f669d9e7e823ad7c21db4a447fcd5962e5ebbd09ae3815b220eb16c8211e3967497cbd66e01d893b78d3e141929f0fb4045b22f9cb503d64fa33312f12bb6062400150a87b50e0f373636a538cf149678123c3c740a78ccae3fe7865495c4bc8f76ee1808345a7acb4cb01e0df91b5e878e8b778daecf53308a94a759b70aa9bfec687cff2321f6fc8e4c0cc1844e9459df0171b6bbac67c7c05c03640d9b837120727fe9de47d378b533f296f94d57fdff2ffcbee65ec1b377879027ce43fe2272bf0be3f8197418f4bf9d0482193521fa538e7e43cf1cc20db377382b769ef155a8ad354aa06f4e02cabdf84470d990f1b9edecd666074fc71526156ccac345cbb9b4b158e51f8c044641c57f1782302a514b45d31236ec856196894e18df3a4b4fe7d5ad54e81c952be1cca4968b2958b7baedb1bee086ee256c6da23d55c7d042c19a87d7b87ae6239c65230ed088d314089273cd3960c421051d3e91cf4d0f2ed47adfba6ea9c93375ed654180f635b99a8dc8cef7f6fecb536535b91140e1a479b793221572fa260ca52dae05da682b46b07ebe143ee840661aefed30309dc5f86ebf80061ff64e7415445636a89fddc05c6c99007389f5915eb88891349ac3265bd591f42a77a46337ccd9a7c6897ed12199161ecd4f80654fae318f5bb9979cfe943ce302b6425d08cb6b2df8a85998cb420bcb336e8ef3e5c0c2e134936b7be5b2f87eb81ddcce42e762be166ac7c7ff17ea502e16dd4cf394799b88408cb00067e89a6864c9b46042454ba8fbb0e7365d736e1dacdbd3d8921149233bc38300d5222649238d9c4117b53d8303d7b353075cd255837ed0030be53d372671938bcd4b8f5715686802f3d5c02d09e0c8b8fb3bdc7d5a36b687d0fbb517c10c289b655b86843413e47d5630fa56f210402ebb6a71b8a50d17385c33d305ef72b2fcbe8ef54a758e78352e8565436cda3902e68b2e46077da309d900e6ad96b7e5f4b6e7654d24a8038a7a170f1fbf1151d52a29c27fbf1efd1b417599932e067ef5428f12ac195c41e99e428a6e5c2b4d58aafb04a45ebaa76aa44fdd4d6a28437712158480676125ed3218c0e0638f29614373abf640ad049d85e58430d575abbf188b0344eeb3e2cf0cc99a96dbce0bf4cf83aaa81cdb01e0d7e137a051a8e532d7ccc270e769d417496ba23adc28af5a66dc72ee5e4aa3090bdafa083db8880b3827e8d79cc4434f1b8d16688872b6669d033715b8acf2b71ad20f0b7df1b6760ce35772a83c025b1d5c250ece7cf9da5a46e274aaa18087baabf8cb99b4abc70573e557db42723a472cbca61af80526c9f8efba6c7bacb7c7fdd37571405419bd5534f8797c6a084b59f71b663045aec3adde6318770d38448b57f1c438c8e5f7409bbca5ccc42bca465001bf75b7fcb357cefbed807630d6cf73283455990dd8b11bfbf2d3cfebc1dbf77d2b2b84af1013890d76f8bfde", 0x1000}, {&(0x7f0000000a00)="5aa38aeafff3389d229aa3e4d0772dab0dafa69645d6375952c5530290009c25532d77cc9f31b38661ea79e4cc4c05d9e0faea73283da20031ffdb4f94da2aa035a6570d6252e5958fcb2d8c", 0x4c}, {&(0x7f0000000a80)="f064d005b8a0f68855feb4e9b7d7c8b61556f439721d4f386c9cde6d0d35fd667b0abc642813ea7a01044e7c15956c667f60d2527dcffc808f060246e2983df72ffca24c08b223d8c968d5ab457d208464e218ad84d272594f0423d57d9f8c872bdc563af94f5499d28f2f30033b040171b9288fccab094a321276fdf464683ee14a010467845068f841cabc04205e9d4c40747271758aa9a2438966b6a5b63c12df026d577f9807f7227896dda9eca7888d3510203a977560adb5798239f585e30c6cf55f1528b5b8", 0xc9}, {&(0x7f0000000b80)="bf264610c0da142d9cd9d5e9e472af063da1d38a0b817e7bcf779b3557e41b91e3881b295343093d61853ec123679225c881ad9a0a03c4cfb951d5fedbd53ccfcb116feffac6d97bc4d12cf9cd43b296b8c4a1624cf124002e41a1fae08877df4ee4163406ccb2a296ffe0acebe96e22935e000fa15c8982ace3ab6e6eee50a54fee7337ff6cb42b5840d90caf652c18fa600b36edec54cf", 0x98}, {&(0x7f0000000c40)="a96f07b0168c98719c93a8ce0cb00533ac0b7bcb318b219729104036226926f1ecbfddb4f785af0f60097afeaccc6df735c0d4833cf74b4d1a44673979983b6d79640ebe361d7da289b28420568614d5cd00719ee39e2903e3c3efbe7abee3e875d97924c3b1c6c54d76a74535da5656c4725d2905c3896c9712804fcb2a4f30a3e5d2f32537147046b33fd61888a829b63049b8eb7ca56413a77e6f8ded7298c8cf995f52033e44faf5ae8eafceac8a7221757921a0423e1bfdaa6d70c09b09854c9297b527b961c6b67969f1a05ff4275bca015cac", 0xd6}], 0x6, &(0x7f0000000f80)=[@cred={{0x1c, 0x1, 0x2, {r14, r17, r38}}}, @rights={{0x34, 0x1, 0x1, [r4, r40, r41, r44, r45, r0, r47, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r3, r48, r1, r50, r51, r54, r1]}}, @rights={{0x1c, 0x1, 0x1, [r56, r57, r59]}}], 0xa8, 0x140}, {&(0x7f0000001040)=@abs={0x3, 0x0, 0x4e21}, 0x6e, &(0x7f0000001240)=[{&(0x7f00000010c0)="6f0d7b13c2b53306424eed4d4db20f76e1e6b43ddb9112f425d882667375500f1b012ba861fc16d85308958dac75016467f01dbd984736007a2928b4ba7c3437474f28f15813fb0dbb6f41e126e5ac237d6b57f1f02fd7eb25e4a2bbc42b74f55231a66600954ae31d2ec99a99ec21756673b522eebeec0dcb2dca2544306916cd0cf418cc9162ea073ebe27a371a4", 0x8f}, {&(0x7f0000001180)="3971a975591536641b08085e30e47403b93e7589f8845f0edd7b630903ce84ace9448fa2965a9fc2dcf00092ace72e972d313636e23f4dd1cc89ef4b23aa4f6ffbbef80aa88a456c26", 0x49}, {&(0x7f0000001200)="88dae9ce57962475099d", 0xa}], 0x3, &(0x7f0000002400)=[@cred={{0x1c, 0x1, 0x2, {r63, r64, r73}}}, @rights={{0x1c, 0x1, 0x1, [r76, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r77}}}], 0x60, 0x50}], 0x3, 0x4000) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) ftruncate(r4, 0x2) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x480000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x8c, r2, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x2000000}, 0x20000000) 03:35:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:35:56 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41b", 0x6, 0xb7, 0x0, 0x2}]) [ 1180.528142] EXT4-fs (sda1): required extra inode space not available [ 1180.554979] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:35:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:35:57 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1f8) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1180.657268] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:35:57 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB='debug_want_extra_isize=0x0000000A00000300,\x00']) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x2}, 0x28, 0x0) [ 1180.820176] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:35:57 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x100000, &(0x7f00000001c0)='/em0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:57 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1fc) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:35:57 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:35:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) 03:35:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41b", 0x6, 0xb7, 0x0, 0x2}]) 03:35:58 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2e21666cc0ec39"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:35:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) 03:35:58 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1181.989026] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:35:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41b", 0x6, 0xb7, 0x0, 0x2}]) 03:35:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) [ 1182.317809] kauditd_printk_skb: 458 callbacks suppressed [ 1182.317819] audit: type=1400 audit(2000000158.660:60487): avc: denied { map } for pid=22116 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:58 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x666d) sendfile(r5, r6, 0x0, 0xa195) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x7f, 0x7}) r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r7, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) bind(r7, &(0x7f0000000300)=@rc={0x1f, {0x6a, 0x7f, 0xff, 0x4, 0x7, 0xe7}, 0x4}, 0x80) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000003}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv4_getaddr={0x80, 0x16, 0xb0bce33f112a23d3, 0x70bd25, 0x25dfdbff, {0x2, 0x18, 0x6, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, @IFA_CACHEINFO={0x14, 0x6, {0x8, 0x0, 0x8, 0x4}}, @IFA_ADDRESS={0x8, 0x1, @rand_addr=0x20}, @IFA_FLAGS={0x8, 0x8, 0x400}, @IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x24}}, @IFA_ADDRESS={0x8, 0x1, @rand_addr=0x9}, @IFA_LOCAL={0x8, 0x2, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x118}, @IFA_FLAGS={0x8, 0x8, 0x45c}, @IFA_LABEL={0x14, 0x3, 'veth0_to_team\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x200840c0}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:35:58 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000800)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa195) r5 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x2000000666d) sendfile(r5, r6, 0x0, 0xa195) r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r7, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) r9 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r9, &(0x7f0000000d40)="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", 0x1ba) sendfile(r9, r10, 0x0, 0x666d) r11 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r12 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r11, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r11, r12, 0x0, 0x666d) sendfile(r11, r12, 0x0, 0xa195) setsockopt(r11, 0xff, 0x37, &(0x7f0000000180), 0x0) sendfile(r9, r10, 0x0, 0xa195) mount(&(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=0x0], @ANYRESHEX=r2, @ANYRES64=r0, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64, @ANYRES32=r4, @ANYRES64], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="717e8dac528228a2bb355b17a01925a2d4f3086435ff794c390226b01e10f35784ace3771c63a8e25eb34b35b8715af54e136cb86658b77de9c609dc4efb4a907e53dd43448d7e14193001c871090cafc5d30f0a836260c06d8e76484dbb998f8e088f3592681a5b6dbf451791e8f776584d0987e6a8d9cb97e3598a8f06aaab4d26f7915bb2eaeb8bb926e6fa2173ababbd4bc1c05ed2db77cf4f831a06ee52100ece096e58d62e54e70358b1945e7905a187dc6ac04199adc66c2afdaaade42b10d77702a5ec74", @ANYRESDEC=0x0, @ANYRESDEC=r3], @ANYRES64=r5, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64, @ANYPTR, @ANYRES16, @ANYRESDEC=r8, @ANYPTR], @ANYRESHEX=r10]], &(0x7f0000000040)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="646d6275675f776161fa6e2ca0cb75a65f6973697a653d307830303030303010303030303030ba36a97800"]) [ 1182.434378] audit: type=1400 audit(2000000158.670:60488): avc: denied { map } for pid=22116 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:58 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1182.590571] audit: type=1400 audit(2000000158.720:60489): avc: denied { map } for pid=22116 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1182.700204] audit: type=1400 audit(2000000158.790:60490): avc: denied { map } for pid=22116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1182.855743] audit: type=1400 audit(2000000158.800:60491): avc: denied { map } for pid=22116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1182.954721] audit: type=1400 audit(2000000158.850:60492): avc: denied { map } for pid=22116 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.108135] audit: type=1400 audit(2000000158.860:60493): avc: denied { map } for pid=22116 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.204514] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1183.256639] audit: type=1400 audit(2000000158.890:60494): avc: denied { map } for pid=22116 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.362723] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1183.380581] audit: type=1400 audit(2000000158.900:60495): avc: denied { map } for pid=22116 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.453215] audit: type=1400 audit(2000000159.480:60496): avc: denied { map } for pid=22128 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.112938] kauditd_printk_skb: 656 callbacks suppressed [ 1188.112946] audit: type=1400 audit(2000000164.460:61153): avc: denied { map } for pid=22397 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.141981] audit: type=1400 audit(2000000164.470:61154): avc: denied { map } for pid=22397 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.433906] audit: type=1400 audit(2000000164.780:61155): avc: denied { map } for pid=22398 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.458075] audit: type=1400 audit(2000000164.780:61156): avc: denied { map } for pid=22398 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.489933] audit: type=1400 audit(2000000164.830:61157): avc: denied { map } for pid=22399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:04 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1fc) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1188.524062] audit: type=1400 audit(2000000164.860:61158): avc: denied { map } for pid=22399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.546925] audit: type=1400 audit(2000000164.860:61159): avc: denied { map } for pid=22399 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r0, 0x2) 03:36:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41bcb", 0x7, 0xb7, 0x0, 0x2}]) 03:36:04 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./f\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="64656275675f77616e745f657a7472615f6973697a653d30783030302a30300400000000f5ffffff002c00"]) 03:36:04 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2eb343635bcf30"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1a, 0x0, 0x104026, &(0x7f0000000040)={[{@journal_path={'journal_path', 0x3d, './file1'}}]}) 03:36:04 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1188.572104] audit: type=1400 audit(2000000164.860:61160): avc: denied { map } for pid=22399 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:05 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) sendfile(r0, r2, &(0x7f0000000040)=0x6, 0x5) 03:36:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r0, 0x2) 03:36:05 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1fc) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:05 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41b", 0x6, 0xb7, 0x0, 0x2}]) 03:36:05 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1fe) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1188.892605] audit: type=1400 audit(2000000165.240:61161): avc: denied { map } for pid=22414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1189.023724] audit: type=1400 audit(2000000165.280:61162): avc: denied { map } for pid=22414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r0, 0x2) 03:36:05 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:05 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x40, 0x110) r2 = gettid() tkill(r2, 0x40020000000c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, &(0x7f0000003480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) ioctl$sock_TIOCINQ(r6, 0x541b, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r9, 0x541b, &(0x7f0000000100)) r10 = socket$unix(0x1, 0x0, 0x0) bind$unix(r10, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) connect$unix(r10, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r10, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r10, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r10, 0x0, 0x0, 0xc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r13, 0x0) r14 = socket$unix(0x1, 0x2, 0x0) bind$unix(r14, 0x0, 0x0) connect$unix(r14, &(0x7f0000000140)=@file={0x3d5d8456ac458b37, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r14, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r14, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r14, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) sendmsg$unix(r6, &(0x7f0000000e80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="face851b3a499bb8cb0ad66684b5fbf28f0f5f7f699c373ec437cd19e4c92f437be066a66e38a0aafeceac42d67e74b9d3f1efeca4350e19484790dbedaad35cb12538c303003937cc92097da96db2e0912b951c3d483ca26988d1f61754922736afea99af15f693509e43eae2ec954c18590f27cc79e6805a2c1648f67dce068ee9ac5f336b7f46cab1d6956849904e7b1f", 0x92}, {0x0}, {&(0x7f0000000200)="d1cf1095f1dbf97abf66f8d6a25d942e3dcbc363fa09d2be2f9933d3e60be4", 0x1f}, {&(0x7f00000006c0)="c9e60d0469bbddef03387ac6827ecc3069dcc77f97dd65f690ca3fc21736c4ff8d13ec7d277a8ac548a89b23d8d895a4d1e643f9a33b8af9b9390d2a1448969f91e26daaa12e93380c2626cde597b3ffd063a93e2d", 0x55}, {0x0}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r7, r8}}}, @rights={{0x1c, 0x1, 0x1, [r9, r10, r5]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r13}}}, @rights={{0x18, 0x1, 0x1, [r14, 0xffffffffffffffff]}}], 0x98, 0x40000044}, 0x8000) r15 = fcntl$getown(0xffffffffffffffff, 0x9) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r17) r18 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r19, &(0x7f0000003480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) ioctl$sock_TIOCINQ(r19, 0x541b, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r22, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r22, 0x541b, &(0x7f0000000100)) r23 = socket$unix(0x1, 0x0, 0x0) bind$unix(r23, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) connect$unix(r23, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r23, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r23, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r23, 0x0, 0x0, 0xc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r26, 0x0) r27 = socket$unix(0x1, 0x2, 0x0) bind$unix(r27, 0x0, 0x0) connect$unix(r27, &(0x7f0000000140)=@file={0x3d5d8456ac458b37, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) ioctl$int_in(r27, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r27, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r27, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) sendmsg$unix(r19, &(0x7f0000000e80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="face851b3a499bb8cb0ad66684b5fbf28f0f5f7f699c373ec437cd19e4c92f437be066a66e38a0aafeceac42d67e74b9d3f1efeca4350e19484790dbedaad35cb12538c303003937cc92097da96db2e0912b951c3d483ca26988d1f61754922736afea99af15f693509e43eae2ec954c18590f27cc79e6805a2c1648f67dce068ee9ac5f336b7f46cab1d6956849904e7b1f", 0x92}, {0x0}, {&(0x7f0000000200)="d1cf1095f1dbf97abf66f8d6a25d942e3dcbc363fa09d2be2f9933d3e60be4", 0x1f}, {&(0x7f00000006c0)="c9e60d0469bbddef03387ac6827ecc3069dcc77f97dd65f690ca3fc21736c4ff8d13ec7d277a8ac548a89b23d8d895a4d1e643f9a33b8af9b9390d2a1448969f91e26daaa12e93380c2626cde597b3ffd063a93e2d", 0x55}, {0x0}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r20, r21}}}, @rights={{0x1c, 0x1, 0x1, [r22, r23, r18]}}, @cred={{0x1c, 0x1, 0x2, {r24, r25}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r26}}}, @rights={{0x18, 0x1, 0x1, [r27, 0xffffffffffffffff]}}], 0x98, 0x40000044}, 0x8000) r28 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r29 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r28, &(0x7f0000000600)="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", 0x200) sendfile(r28, r29, 0x0, 0x666d) sendfile(r28, r29, 0x0, 0xa195) r30 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r31 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r30, &(0x7f0000000600)="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", 0x200) sendfile(r30, r31, 0x0, 0x666d) sendfile(r30, r31, 0x0, 0xa195) r32 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r33 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000580)='ns/pid\x00') r34 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r35 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r34, &(0x7f0000000600)="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", 0x200) sendfile(r34, r35, 0x0, 0x666d) sendfile(r34, r35, 0x0, 0xa195) fcntl$getownex(r0, 0x10, &(0x7f00000005c0)={0x0, 0x0}) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000600)=0x0) sendmsg$unix(r1, &(0x7f0000000700)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000280)="1b1eaaaf09a5e6080aa854ccd167e5cfb76735a67a4045b3f6ff82a320bf39dcfebce0e9869c3c41146323a18fe29b24cc32a924a5c19ce7b2ca2598", 0x3c}, {&(0x7f00000002c0)}, {&(0x7f0000000300)="aadb679eb8d71927d9a3e300d3b0551a289b379c2594a942a87827cbd60d93e149ed4f9d983922e50a13f1d40ae5971be85770bd0d7e63aa09976ee7049c6fd8547dcfb83242e839a50e8f45cecda8ad21ae6fdef9f234d9a30c294bcb9ad3", 0x5f}, {&(0x7f0000000380)="bbd0c0b02dff839f1c1c10201a06c33c6b30cba6a343f61b5834a3b7ca5ab4342ee39b76911df51e57ca7c06899fc5506f59d2011fc9acf014923ca9eca951cbbe00dc78ed9eedf64184fc608b6bfc94a7f331e8fd734d32bf1cab", 0x5b}, {&(0x7f0000000400)="52336e4470169407e53cbe9703dd764b3e29faaed90bcd241b0635fda27c936a60b5b55efcb06f6948983cde48f6ecf7d4ba65baed4354f304fc07cdc69cc9d13f3904f96129761f303cd79cb59820d95736673aa1ac60ffa5ad34fa041a76674db3feb47f76f92f93f24ca55ae7fd93834f90ff3ab71aaa46e41a0dd25571b28379ea9c50cd46042b1b31a85e443682c616bd06c5762e63a99789ab1a3c52d0d3e7a48ac17d5b62b31159f947d06eaa49e48f318756d9", 0xb7}], 0x5, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {r2, r4, r13}}}, @cred={{0x1c, 0x1, 0x2, {r15, r17, r26}}}, @rights={{0x18, 0x1, 0x1, [r29, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r0, r30, r0, r32, r33, 0xffffffffffffffff, r0, r34]}}, @cred={{0x1c, 0x1, 0x2, {r36, r37, 0xee01}}}], 0xb0}, 0x40010) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:36:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41b", 0x6, 0xb7, 0x0, 0x2}]) [ 1189.400159] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1189.469885] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:36:06 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x80) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) r4 = open(&(0x7f0000000140)='./file0\x00', 0x2c982, 0x0) r5 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x666d) sendfile(r4, r5, 0x0, 0xa195) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) ioctl(r1, 0x8, &(0x7f00000001c0)="94ec7a31e9e56c39a00d2d57cbeb94593372d851ce95d75b495e2a17f43cb6e6ad6904a7d363bddb03451b428ec88b") r6 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r7 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000200)={0x8}, 0x4) write(r6, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r8 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r9 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r8, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r8, r9, 0x0, 0x666d) sendfile(r8, r9, 0x0, 0xa195) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000240)) r10 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r11 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) write(r10, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r10, r11, 0x0, 0x666d) sendfile(r10, r11, 0x0, 0xa195) symlinkat(&(0x7f0000000380)='./file0/file0\x00', r10, &(0x7f0000000100)='./file0\x00') sendfile(r6, r7, 0x0, 0x666d) renameat(r11, &(0x7f0000000280)='./file0\x00', r6, &(0x7f0000000300)='./file0/file0\x00') sendfile(r6, r7, 0x0, 0xa195) ioctl$EVIOCSABS3F(r6, 0x401845ff, &(0x7f0000000040)={0x9c2, 0x51, 0xffffffc1, 0x4, 0x40, 0xb19}) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2e3d4669c95c6c"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="6a71666d743d7666736f27e82c00"]) 03:36:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:36:06 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x3) 03:36:06 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41b", 0x6, 0xb7, 0x0, 0x2}]) 03:36:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:36:07 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0x80000000) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) [ 1191.314839] EXT4-fs (sda1): required extra inode space not available [ 1191.332221] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1193.122198] kauditd_printk_skb: 348 callbacks suppressed [ 1193.122205] audit: type=1400 audit(2000000169.470:61511): avc: denied { map } for pid=22567 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.155703] audit: type=1400 audit(2000000169.500:61512): avc: denied { map } for pid=22567 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.178842] audit: type=1400 audit(2000000169.500:61513): avc: denied { map } for pid=22568 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.201237] audit: type=1400 audit(2000000169.500:61514): avc: denied { map } for pid=22568 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.224965] audit: type=1400 audit(2000000169.500:61515): avc: denied { map } for pid=22569 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.247291] audit: type=1400 audit(2000000169.500:61516): avc: denied { map } for pid=22569 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.270876] audit: type=1400 audit(2000000169.530:61517): avc: denied { map } for pid=22570 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.293341] audit: type=1400 audit(2000000169.530:61518): avc: denied { map } for pid=22570 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.316371] audit: type=1400 audit(2000000169.550:61519): avc: denied { map } for pid=22571 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.338841] audit: type=1400 audit(2000000169.550:61520): avc: denied { map } for pid=22571 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:12 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1fe) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:12 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41bcb", 0x7, 0x0, 0x0, 0x2}]) 03:36:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 03:36:12 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = socket(0xa, 0x5, 0x6) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x78a}, "c0d45af3e85cab1e", "ded4d8960a3eff705dc3ca120141af18", "4c958ba1", "73bdc994d10060c6"}, 0x28) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="7aa4d32a6c6530"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x300000c, 0x100010, 0xffffffffffffffff, 0x5f) sendmsg(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x1, @empty}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)="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", 0xff}, {&(0x7f00000002c0)="af54d84c852e904b8f22679d6d44da5cfcaa7d3a2f8cc0e8a82947bb3e7f57b5cbe565f712ab53abf400a79c00704241727121af55d5848bf7f084314b78a62b0b88b8bbec259f595cc0ebd4df7ecfb1e348862a8e0047dc3456c2f5384a3ee4cfc7019199e42b33e46da507ffe4cee91298203485", 0x75}, {&(0x7f0000000340)="762ac62305", 0x5}], 0x3}, 0x50000) 03:36:12 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="000004000001000000000000d6057e376d000eff00"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xd2800, 0xf1ee0fadab05b2f6) sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0xa55}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000240)="1f866f395bb023db95335728210fd2900dce09b5e81b02cfc3a24d6634c2c7c7c4d9f3052c0072140e34209beed4c1095d06b93651dc566a300a715492337c9534670f88a32b3dbaadde0c80fd3f295074a6e8af19afc4b3ddf67fa821fe54dc5163a92cc582229c87329aaca528da6bf0ade44a63d0366ccb57ae89ee5a02d4b9f4827611de1b1a5ad86ce73ca2a9d9c190a7567823", 0x96}, {&(0x7f0000000300)="22af59128c6354e4d44898d82e438fc8347f00a26d0e35de290a43556b1753465bd914471c3967f7596a8a7eb24ba9cd7acef0e8ca3ef59e14f64adb2bca4e8de21f24df05ae7efe368c7f3f9706", 0x4e}, {&(0x7f0000000380)="c87d6ab120a4fbe5616021f1cc2024e0a850dd5f8956f2b18a255e0ef5ce09286943488088572ec326b4bd6c3fc358420c3835c72d44a12944ca613ea65d26352fa44512348d2b1ad3b8ebca451200c9a24ab4ffb98e7c939851dc2d1961d9b6e43e99fdcb6d1bf30d00528a8c51d4a16cc7e5e459c5376a8073661d6fa56443f1", 0x81}, {&(0x7f0000000440)="8d847da75ccd1c82a11ba6e5626dab698dc12778bc80c7e32b99fc0ebeaf456d4b9969a45c6e9878982537355ddd00c0ffaacd1463fe3440f5947b207e7fde8184bea8bdcb71a1a0e4ba91b6da04d6a09ff183e4062fc2aa154cd2210505ec0d56387085c5f6ff4c4fdf2a92e070ebd55936afa7f77f38ea2b13a38ad770e05842ca457b9bfeb3e9f30b422f58cdfca21e20b3c02513bd6c4015ff81ffdddca8b66ca39f53c29925d4781722ec62282410de96b96c99427833d8f9f30f7b8aceed47e82e9b1a60a4278860e8aeed57febf67890d27c5afeff51cdf6ea91aa894ac7899", 0xe3}, {&(0x7f0000000540)="1cd705494feba301092793eaf38b2c69b1766622842cca8dd6b87567934020698f68ed3347b1a925084aaa515d71ad88ce8f96af4fc78050416c73ebc8e1af0e5d1d4d5ca36d6251e2c1027f0079", 0x4e}, {&(0x7f00000005c0)="d632450443b55a1c2a107451b6c37cadf8f3d38bfac9a07d325ed52252e991f3c43d6bec2c63802cb00c909f672f6afff817e1a381abf360efe1102cf3fcd7d41b66aab8977a1d1295af1bc756fd6fa25ac77a3652e3e9fc43ac279e8d14742df679bb40c22ffa3b0ad7fd4abd047b7ed4bf8671d99546f91610adc50d2ad274e4cfa1f2e512d42d671aaff28c0448c40cc6c0bb1918ef8038", 0x99}, {&(0x7f0000000680)="74aedab16648300a2865199e77a2ba4ceb6e49b67b001afd87be877932ea9f2923482e5c12a60e72b82eeb82917fc1ae193fe9d6f13abe659164005504fd1690d80b81a735c613687755ee373dd7d56b312b9213ef6230f02a995213a29779f111354ffafbf07e60338b3b767f271388abfc4eae2e1e720e7a7f8a252707", 0x7e}, {&(0x7f0000000100)}], 0x8, 0x0, 0x0, 0x8000005}, 0x40003) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:36:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, 0x0) shutdown(r1, 0x2) 03:36:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000040)="b0", 0x1, 0x4, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41bcb", 0x7}]) 03:36:12 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:12 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1fe) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:12 executing program 3: open(&(0x7f0000000040)='./file0/file0\x00', 0x80c2, 0x231f2fb5380638b1) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) 03:36:12 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1ff) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:12 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x9, 0x400}]}, 0xc, 0x3) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file1\x00', 0x4, 0x0, 0x0, 0x292c026, &(0x7f0000000100)=ANY=[]) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x19, 0x7, 0x5, 0xa, 0x2, 0x344, 0x5, 0x82, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)) 03:36:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, 0x0) shutdown(r1, 0x2) 03:36:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000100)="69498272b41bcb", 0x7}]) 03:36:13 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2a1fc4", @ANYRESOCT, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES16=r0, @ANYRES16=0x0, @ANYPTR64, @ANYRESOCT=r0], @ANYBLOB="a5728b5f62f662bbbd98557b72fe2bb5f6910f9cfc649b302f9e8d3f7de5e154308bbd315e1b5610936f157b1bb3816209c933b2750deece434be5452cf36c25cebd27fb1664adedf7a561e393f6da8848308105230cbac9fc7294124eaf4f6341bfce12b689b424e29822a99f772bf5f148ac34b2fee154b4dd8388ff3ab8928750e509c0a24a962d5b144e2a06ee95aa442eabd19fdb7b5da53b15b76a45139b87368052b413b2632a89c4e189fa6b82b245e2947090a6ed869133f3a7022aa36b7a3d", @ANYRES64, @ANYRESDEC], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="64656275675f77616e745f06000000eeffffff0000003d303030303330302c00"/43]) 03:36:13 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, 0x0) shutdown(r1, 0x2) 03:36:13 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fremovexattr(r0, &(0x7f0000000040)=@random={'system.', '#^^#/securitymime_typeppp1selfmime_type\x00'}) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:36:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, 0x0]) 03:36:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)) shutdown(r1, 0x2) 03:36:13 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:14 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = accept4(r2, &(0x7f00000004c0)=@ax25={{0x3, @default}, [@bcast, @netrom, @remote, @rose, @rose, @bcast, @default, @netrom]}, &(0x7f0000000440)=0x80, 0x100000) r4 = socket(0x0, 0x0, 0x2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000007c0)={0x18, r5, 0x200, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000000680)={&(0x7f00000005c0), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r5, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0xa8a0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)={0x188, r5, 0x100, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffe00}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe82c}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xaa}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x712}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x800}, 0x8000) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000980)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x94, r5, 0x5b88c469b4f2068c, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x800}, 0x80) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r6 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r7 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r6, &(0x7f0000000600)="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", 0x200) sendfile(r6, r7, 0x0, 0x666d) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) r8 = open(&(0x7f0000000140)='./file0\x00', 0x400, 0x0) r9 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) writev(r7, &(0x7f0000000800)=[{&(0x7f0000000300)="aa3af669fbdd07e8391af284e49b3d33769e5c5219592c8c908055926de240d4785e045ea18ac1029bedb5fc5eb31b553292b4d2095140d0d1c7c75379d601b3b10f83ef8797b99cde186b7977c1265bdf70415752bfade5bc37b01bffa69089b8f42be692eb488f6e096f4931adf0c2bdd3ffb0a0691c0093f283d198215e3799f14cceb70087a0aeecd702c76f3c13928e7af2bfdfe85a02409f16b265ed842566b3cac47fd1cce197ab080c00f12134e3f9bac728bb4a33f87d21ba2742f8e2b6620373f953f8960122b6dcb792e21c82dc0ad81753df2abdd13a365ab57ecc2f436e0b47a37524b4fd51cd0e28c70935", 0xf2}, {&(0x7f0000000080)="266ac468de4c6e1ccf5407d8e181dba0521da5730af09e1e96220a0d676b331168ae2520880b89d0b1903f2825e9bd1bfd16be6755662d25810715a28fafe7da4b2a8d79eb45eda371691c6a314bc2387c50b257849eb839479e807928b67fc98b800640e1a0d3b174ea7d87c08b35d24abe9151dc2ed14010df826e766fb232e7e68abffc61c6d8f0bf894040", 0x8d}, {&(0x7f0000000200)="5d5925d6e7636de1b35f759822e85ebab19dce6aa64f5b98d979d6dfb71a9e5ddb574a9d805d828994ea984c6ffe053b61dcd47bc11f579cec9bde4dd60f55f333cef8648bacbe07347c6bf2c08310a2b2c2d538e46f5e808fedfa8252c23e4fa36a1543e00db19369fa4722f8139bac6c5a", 0x72}, {&(0x7f0000000400)="ce8ec5a604b94d66452673a08279cbe6474789eaeb7b31f1da60755df37ab65813f01033ff7670342e891736556bfc3a012e29c06d0d19a7a024949978f7f4e241c3fa491f99d6a5795f94b1", 0x4c}, {&(0x7f0000000280)="1e22cc856e687d77257a06e1f946620273a7d6d62b3a49bb7091b25cd174b9203366846eefa7601be413a48ffed64e12a66e9bb381e457e072d4113df4ea", 0x3e}, {&(0x7f0000000480)="f8bf7af446f21bf41243b1b32e2aed9d3bdd43e26710841b126ff6744d7ce7d61fc71cbf355847200f6d5d0ac113824e9c5c29191ea38c775591f084f14bddeb0a51058cae58b14d86b0bf0f3461ebe75c44e0656b165c3f8e3a112a5370c10fe736cebca38088fd45811d37fe6d56e2f6bf1680", 0x74}, {&(0x7f0000000500)="d5c3d71b7e393b2fbe55da8eb7c7399d47200c4f2febb6724907026ecbe2cd3294f54e5ac855897cd80fefa8a3161cf84c3f07a06b158028cd753789df3f3a3d5c16ac6b370f9cacf1330fd1231128ce59b50686ff76db088b8c3f9bd976415ef9011a58ff9fba6cf312c66cf83547b127a3a31a0bf794422bbc3636fe2ecf8605a12ea2a5bc3ea478d4931cba9787e78f5aae5c6881646dbd629c31e310b02366b64bbf016585af8c557424e2", 0xad}], 0x7) open$dir(&(0x7f00000009c0)='./file0\x00', 0x400, 0x0) write(r8, &(0x7f0000000600)="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", 0x200) sendfile(r8, r9, 0x0, 0x666d) sendfile(r8, r9, 0x0, 0xa195) sendfile(r7, r8, 0x0, 0xa196) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x100000000006b, 0x0, 0x0, 0x104026, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r7]) [ 1197.891741] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1198.010134] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1198.149379] kauditd_printk_skb: 407 callbacks suppressed [ 1198.149387] audit: type=1400 audit(2000000174.490:61928): avc: denied { create } for pid=22790 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1198.330160] audit: type=1400 audit(2000000174.530:61929): avc: denied { write } for pid=22790 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1198.456996] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000006" or missing value [ 1198.507122] audit: type=1400 audit(2000000174.590:61930): avc: denied { map } for pid=22797 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.650809] audit: type=1400 audit(2000000174.590:61931): avc: denied { map } for pid=22797 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.702495] selinux_nlmsg_perm: 6 callbacks suppressed [ 1198.702507] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22800 comm=syz-executor.3 [ 1198.916258] audit: type=1400 audit(2000000174.620:61932): avc: denied { map } for pid=22797 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.989480] audit: type=1400 audit(2000000174.630:61933): avc: denied { map } for pid=22797 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.058337] audit: type=1400 audit(2000000174.640:61934): avc: denied { map } for pid=22801 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.096601] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1199.104227] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1199.111598] audit: audit_lost=513 audit_rate_limit=0 audit_backlog_limit=64 [ 1203.223210] kauditd_printk_skb: 715 callbacks suppressed [ 1203.223218] audit: type=1400 audit(2000000179.570:62617): avc: denied { map } for pid=23066 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.251524] audit: type=1400 audit(2000000179.570:62618): avc: denied { map } for pid=23066 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.564216] audit: type=1400 audit(2000000179.910:62619): avc: denied { map } for pid=23067 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.588983] audit: type=1400 audit(2000000179.920:62620): avc: denied { map } for pid=23067 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.626839] audit: type=1400 audit(2000000179.970:62621): avc: denied { map } for pid=23069 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.662421] audit: type=1400 audit(2000000179.990:62622): avc: denied { map } for pid=23069 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.684908] audit: type=1400 audit(2000000180.000:62623): avc: denied { map } for pid=23069 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1ff) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:20 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2e2f66696c6583"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x20) 03:36:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, 0x0]) 03:36:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)) shutdown(r1, 0x2) 03:36:20 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) sendfile(r0, r1, &(0x7f0000000040)=0x40, 0xfffffffffffffff9) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:36:20 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1203.709729] audit: type=1400 audit(2000000180.000:62624): avc: denied { map } for pid=23069 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)) shutdown(r1, 0x2) 03:36:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, 0x0]) 03:36:20 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1203.905843] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1203.964365] audit: type=1400 audit(2000000180.310:62625): avc: denied { map } for pid=23086 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:20 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = request_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='\x00', 0xffffffffffffffff) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000008c0)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) sendmsg$nl_generic(r0, &(0x7f0000000e00)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x82220a}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000e40)=ANY=[@ANYBLOB="c40300002b00100429bd7000fedbdf2500000000cea21c3e9509373a2d1bce33f77da860cad1a6439c33de7d169c15042c3a3f7680590e4f2bc6a0e27cfb00211a52d664fba0af8713b49517d3052a0def7aae8d2d264868dde9f6782ad8a34e78bf3233caaba37c5d25b8cb32135cf16535019f870f765dec742b8fa336807a5bdf5443dd450d52cdcbe7be97904f3d065bf3c02b46211dbe38936161f022708ba8bb9e8dfda20aeaade864b5ff883e3a27a247447b8c3eb4f0bbf63bd42e108273ff70d61c065a3b1508008300", @ANYRES32=r5, @ANYBLOB="c8000e009a38519a24145e7a08a1d26a21341c70a1871469f208003000", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB='\b\x00e\x00', @ANYRES32, @ANYBLOB="00990e0000"], 0x3c4}, 0x1, 0x0, 0x0, 0x24080000}, 0x71e02718918902a8) r7 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r7, &(0x7f0000000600)="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", 0x200) sendfile(r7, r8, 0x0, 0x666d) sendfile(r7, r8, 0x0, 0xa195) ioctl$RTC_VL_CLR(r7, 0x7014) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000840)='tls\x00', 0x4) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r9, 0x0) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000780)=[{&(0x7f00000001c0)="be020fe50a1e6aeabe9529f60a24fc367e338f2f11036f59f6e99b6f4b128d97d3ecfd5797ba3b8cf59db64c5d85150a274a4b3fcd8beaf75212b7a16a266c007f3c24a53f6834ae393bec92fc7f18f3a613cb520d56593a50c6ab54bebbda3dda66d96728d8f4b559a3c73020dcc49cd2638670ab26d451cb40006dbabd852cc22bdaf9037d518548f990a0a82109117a9aef47b36f24484778bb1713d2da747e45d4b89615a89ef895b79d6370bf024ef59092025218fad54a263b0169ee033e5503d19bb8973aa9026747", 0xcc}, {&(0x7f00000002c0)="00e3779212bb83173329663b7000833015c5949393ae4ef94bc9b303418cb50dae65309f7403dc62c19fd17d348c60cd1abaf5533fc234f08eb1362762e66f5d4f86a4a1977a955dc10de8667d451cdec38b746210b6c342c3b80b3ff93b545bd39ea2a43dbe162f2b98bf2a1ae91a26acbe1d5ec5a727007f297ac267f208a12173e09690e53937bcad3a816c06d367afc6fe1eb780c4159b04692d5e9b4d27c8ecd3deb7641ceec974454c3ad2fc791979fcba7042e04dbc32", 0xba}, {&(0x7f0000000380)="2188bc5d458a8bddf8ebbabb65f35f4093342fc0793621d5c5694b81d1a5bf8f3a62", 0x22}, {&(0x7f00000003c0)="8f334dec2a761bdaa8d2e54bac782408a65e3ca2951b428cd2c7edd3628d1fe3591b788569ec5c81a5c27fc818de4982e5cc6bd2716cc3dcc5ea1fc297915c72c97529357bd64bfd0baff9073af787666c833f07599db53d92f7549aa73d8131c9c0957a46117ec097880cc8e7ce622bfbf727b426899e7d05482f3e0563d85f81a85c12ec1f5687ded0baa0e726e3828910390082e1231b2e0545d85659f0695a11f2aff9d5226cb4cda745f4d55f2483c5a1af5023f552d7318b900209e6e2552e2fbaef1d0c85", 0xc8}, {&(0x7f00000004c0)="7028e5fab5e92b75729fa8e4672b91aac0e807a163c53b88fb2cd7a0cee9f1ed498e893c9a6930cb452c99f3f651855cc0ac27d5d345892f2c1ea49b487dfa7e4a15a0a620a1f75b26e0e0cfbfa1d8f2c110484a888e170a6377e6e7828d4082aa598f4f4bbd531ff5d6ef355611456ba1d12958e3712d7f", 0x78}, {&(0x7f0000000540)="b33b97dcfef19d0c0fa146810c3fdd19cee0b4a8136ac63d457cf7fe86921f54720063cdf8bd88ab7cd6349b5b4d1181bb8128de7e4683e7b1dabd0db2abcb59b304b87548b26e1a296cf31457aa0c37e80a8a1f5c70ad968b1322fd1316624380f5986392a5a57013e6bd9ad326a08887599416b417a3445c04c51b3f370c1130ddb85476a76fc6945a4566e4f3fdb2d617c49914cdcbfc849d5926e98ba2ca41a391457ac4e795c6bec28ae3b0fcac011a9050e3f6eab0fd1c", 0xba}, {&(0x7f0000000600)="047ce8462e77be8c2f275ceed4f2fc09f341baa805", 0x15}, {&(0x7f0000000640)="cc72de8c7aff595b7714aa54150cdcabef3b29c24743ff59eab033183606b0620a67b6d4dad69a4b0ab0925428b652d9a0d091a38f0447f2e926778c59fb261760be57d49fd5946d36b5f9f377b29af4bfe3ea45ecda34a01bae62e044c850a15b4ba78ed6f2ad20c53a6e026043a7a79625cc6a96a629df24188e3678efd738e044cb8cf2e21c49d3815735f3b98426976734fdf896", 0x96}, {&(0x7f0000000700)="b3188013edecfe3ae327a1dda752141a381f491ee1a1df9be5066f57fbedcf66c0ab8f3625e8927c0b47261603a178d112543ab4e77f39fcf4ae7f0dad93266c6cc5e570a8d71dd11dd8fe20cfb43add861e18b5e83896d8cb4ad480e2d2a96627713b1d60024f8f390d3e44", 0x6c}], 0x9, r9) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) [ 1204.092838] audit: type=1400 audit(2000000180.310:62626): avc: denied { map } for pid=23086 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:20 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2e2f32696c6530043a41891f0c4bbe96f998943f5296372f8c084bdf5518435d91e87f4ee331c875f93955515531144554372738037690b67f8935f179b3511525b8110b428d3631714c441e5a279c7839e5cd041f8793a2134adf9e09105274a0ed5d0657f056d0d6283729b9e65a3fd94de8c0dbc23258861dafafa05d9141642eeb4e5b2e1f7bda9ac115e7ba4273611d5fb04d5106b036269df27ee00a90eea5f368754000681f7d941154c07b9b4db86fa6438932f5861af24728defb7f367b0000"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 03:36:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(0xffffffffffffffff, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) 03:36:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="69498272b41bcb", 0x7}]) 03:36:21 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa195) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) 03:36:21 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) 03:36:21 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x42) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2edc8e696c6530"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x9d9b717f8466e6fb, &(0x7f0000000040)=ANY=[@ANYBLOB="6a71666d743d7666736f6c642c6d61736b3d5e4d41595f57524954452c00f0de03a52f775c2e43f0767e8dc41281e29dfc6dfdc0cb40b8bd1626"]) pwrite64(r0, &(0x7f00000001c0)="962eec70ec3e2116ccb22bbbb6b009aba26014d2f92309c639b1139d5807a63763361a474d12b7b110660eca6e76bd4d25f418262d6f8cf841c2ba0fffa64ebe78dd9d315f7dca010e179d7147af211de4bbf53a65e13ce8e8047876f2206ec0fd5c9cf4d85cb08df20e08a22ec9bdfdab2d3bc0136fe2373c33b34ec697886e7690c44104a26ffc742b576ea63d4f8d7f3d9a1c4ddc103317069eb910ee8555fd1de82b7758286556315880114c934f493e0af2daff9bbeb0f40bb97b8b701a69411ec6260ef64d1bb4a1854e5be2f64a1ccc466e4ec91ed9478368d9b9fa6de06608d3f3748c5c9a7cf603", 0xec, 0x1800000000) 03:36:21 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1205.503763] EXT4-fs (sda1): required extra inode space not available 03:36:21 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66696ca1ffd55347f59fe5711b1e33f1586530"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1205.566474] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:36:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(0xffffffffffffffff, 0x2) [ 1205.705016] EXT4-fs (sda1): required extra inode space not available [ 1205.750118] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, 03:36:22 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) ptrace$setopts(0x4206, 0x0, 0x5, 0x2d) 03:36:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="69498272b41bcb", 0x7}]) [ 1206.512050] EXT4-fs (sda1): required extra inode space not available [ 1206.528529] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1206.621742] EXT4-fs (sda1): required extra inode space not available [ 1206.637581] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1208.240854] kauditd_printk_skb: 367 callbacks suppressed [ 1208.240863] audit: type=1400 audit(2000000184.590:62994): avc: denied { map } for pid=23191 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.282032] audit: type=1400 audit(2000000184.590:62995): avc: denied { map } for pid=23192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.320121] audit: type=1400 audit(2000000184.590:62996): avc: denied { map } for pid=23192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.349623] audit: type=1400 audit(2000000184.620:62997): avc: denied { map } for pid=23191 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.390665] audit: type=1400 audit(2000000184.630:62998): avc: denied { map } for pid=23193 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.415795] audit: type=1400 audit(2000000184.630:62999): avc: denied { map } for pid=23193 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.441678] audit: type=1400 audit(2000000184.660:63000): avc: denied { map } for pid=23194 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.463975] audit: type=1400 audit(2000000184.660:63001): avc: denied { map } for pid=23194 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.489347] audit: type=1400 audit(2000000184.660:63002): avc: denied { map } for pid=23194 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.512258] audit: type=1400 audit(2000000184.660:63003): avc: denied { map } for pid=23194 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x0) 03:36:28 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(0xffffffffffffffff, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="69498272b41bcb", 0x7}]) 03:36:28 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 03:36:28 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x1) 03:36:28 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x0) 03:36:28 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:28 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(0xffffffffffffffff, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:28 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f00000001c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) close(r0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)=ANY=[@ANYBLOB="64656275675f77616e745f6578742502000073697a653d307830303030303030303030303330302c00"]) [ 1212.043926] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:36:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x0) 03:36:28 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2840080, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}, {@nouser_xattr='nouser_xattr'}, {@journal_dev={'journal_dev', 0x3d, 0x1}}, {@data_err_ignore='data_err=ignore'}, {@nojournal_checksum='nojournal_checksum'}]}) 03:36:28 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:28 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb", 0x7}]) [ 1212.806840] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%" or missing value 03:36:29 executing program 2: r0 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x12, &(0x7f0000000000), 0x20a1562f) 03:36:29 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '+lo]\\'}, {0x20, 'jqfmt=vfsold'}, {0x20, '}vboxnet1'}], 0xa, "85e497fc8d7d84cf4ecb2c0edefc030776979e5829c76dbdba87da631d86b48117196a2e2644fd81aa4bcc36eaed6257649a101cf024a3411a1db47089646ec443738a645ec7b035185ca384a5edc65162f36f821aa3fef0fae7d02960e6a2d73ce6501547232ef91218"}, 0x92) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 1213.070113] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%" or missing value 03:36:29 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:29 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x78efaa2eb72f852c) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) getuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x44027, &(0x7f0000000040)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}, {@init_itable='init_it\xa3*;\x15'}], [{@obj_role={'obj_role', 0x3d, 'md5sumppp0\x8fposix_acl_access}cgroup'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x2f, 0x34, 0x32, 0x65, 0x61, 0x31, 0x36, 0x36], 0x2d, [0x67, 0x34, 0x5, 0x37], 0x2d, [0x57, 0x39, 0x53, 0x63], 0x2d, [0x35, 0xca8f205cc9e6c1c8, 0x66, 0x63], 0x2d, [0xcf5079586dae3ebd, 0x32, 0x37, 0x65, 0xf, 0x36, 0x66, 0x66]}}}]}) capget(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)={0x7c5a, 0xffff, 0x2, 0x6, 0xffffffff}) [ 1213.264960] kauditd_printk_skb: 504 callbacks suppressed [ 1213.264970] audit: type=1400 audit(2000000189.610:63508): avc: denied { map } for pid=23467 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb", 0x7}]) [ 1213.441190] audit: type=1400 audit(2000000189.670:63509): avc: denied { map } for pid=23467 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x1c8}, 0x3c) [ 1213.649495] audit: type=1400 audit(2000000189.690:63510): avc: denied { map } for pid=23467 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1213.761387] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 1213.815448] audit: type=1400 audit(2000000189.730:63511): avc: denied { map } for pid=23467 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:30 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1213.943242] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 03:36:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0d0a18db43915e3a702a9d8aea872943afd874e2f98b579a7186270146d0e02c06cffa8c67cd7dcc6760253ef0b2a20a602210318f8104a27ea57b012d31c34951dc119dac04eab9c68842086234a45fbe20200000000003b", 0x66, 0x400}], 0x0, 0x0) [ 1213.989033] audit: type=1400 audit(2000000189.750:63512): avc: denied { map } for pid=23467 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:30 executing program 4: init_module(&(0x7f0000000040)='jqfmt=vfsold', 0xc, &(0x7f00000000c0)='jqfmt=vfsold') open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1214.091454] audit: type=1400 audit(2000000189.790:63513): avc: denied { map } for pid=23470 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.130170] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure [ 1214.227056] audit: type=1400 audit(2000000189.790:63514): avc: denied { map } for pid=23470 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.370138] audit: type=1400 audit(2000000189.790:63515): avc: denied { map } for pid=23470 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.463396] audit: type=1400 audit(2000000189.820:63516): avc: denied { map } for pid=23470 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.587043] audit: type=1400 audit(2000000189.880:63517): avc: denied { map } for pid=23470 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.612962] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 1214.703928] EXT4-fs (sda1): re-mounted. Opts: [ 1214.708250] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 1218.276702] kauditd_printk_skb: 704 callbacks suppressed [ 1218.276711] audit: type=1400 audit(2000000194.620:64222): avc: denied { map } for pid=23747 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.304773] audit: type=1400 audit(2000000194.620:64223): avc: denied { map } for pid=23747 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.329265] audit: type=1400 audit(2000000194.630:64224): avc: denied { map } for pid=23748 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.351768] audit: type=1400 audit(2000000194.630:64225): avc: denied { map } for pid=23748 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.376878] audit: type=1400 audit(2000000194.650:64226): avc: denied { map } for pid=23749 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.399466] audit: type=1400 audit(2000000194.650:64227): avc: denied { map } for pid=23749 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.423420] audit: type=1400 audit(2000000194.660:64228): avc: denied { map } for pid=23750 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.446144] audit: type=1400 audit(2000000194.660:64229): avc: denied { map } for pid=23750 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.469943] audit: type=1400 audit(2000000194.670:64230): avc: denied { map } for pid=23751 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.494482] audit: type=1400 audit(2000000194.670:64231): avc: denied { map } for pid=23751 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:36 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:36 executing program 3: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) fallocate(r0, 0x0, 0x3, 0x2) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r2 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x7f, 0xc81) ioctl$RTC_UIE_ON(r2, 0x7003) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) 03:36:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="69498272b41bcb", 0x7}]) 03:36:36 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:36 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1f0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2002020, &(0x7f0000000240)={[{@noquota='noquota'}]}) 03:36:36 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000280)={[{@usrjquota='usrjquota='}, {@oldalloc='oldalloc'}, {@block_validity='block_validity'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xf5ff}}, {@grpid='grpid'}, {@test_dummy_encryption='test_dummy_encryption'}, {@noquota='noquota'}, {@nobh='nobh'}]}) 03:36:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) [ 1219.995128] EXT4-fs (sda1): required extra inode space not available 03:36:36 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0xf2480) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa195) write$P9_RSTAT(r2, &(0x7f00000001c0)={0x4f, 0x7d, 0x1, {0x0, 0x48, 0x7ff, 0x1, {0x80, 0x0, 0x4}, 0x20000, 0x100, 0x1ff, 0x400, 0x5, 'user\x00', 0x1, '{', 0xa, '-/$vmnet0}', 0x5, 'user\x00'}}, 0x4f) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) ioctl(r1, 0x200, &(0x7f00000003c0)="0c4947c6c3beeeb838d3097851ee1e3956978817a4df36ee24e29ce00b6b4eb3409442a50da0eb0f0d5dae2e9dbe4d") renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 03:36:36 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) 03:36:36 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000003380)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b0xffffffffffffffff}) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000200)="bf6e6e0320aa7d1ea9fc9b9daee3747b051bc7c8918e94703bc4395b4740d0519b50f91c6ff5952245a79dcd62a2a945d1d5dd51059cc43ac722858e245a9397ad4d47ee9f685ad605f1dae88a46bac03f9b60028ab520de6da822474c2d5de909965e6c784039cb3e4f7e36d7a2a30cdd7a57148e256639d4a7ca2cbd925c54d51a6b043c299724b8ac8f7b4f08905126fa34b0dfd68266efa880b98bf38dfafd0f33bb96f2a4b507a702ef23f5cb9bfea5fb7258d9202e776267d4f3d4d5c417cbb412ba27963615f0590dac4356b861ca1a31", 0xd4, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 03:36:37 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104026, &(0x7f0000000080)) [ 1220.667320] EXT4-fs (sda1): Ignoring removed oldalloc option [ 1220.682428] EXT4-fs (sda1): Test dummy encryption mount option ignored [ 1220.714052] ================================================================== [ 1220.721655] BUG: KASAN: use-after-free in __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1220.730117] Write of size 62943 at addr ffff88819762aaa0 by task syz-executor.1/13019 [ 1220.738532] [ 1220.740174] CPU: 1 PID: 13019 Comm: syz-executor.1 Not tainted 4.14.154+ #0 [ 1220.747432] Call Trace: [ 1220.750357] dump_stack+0xe5/0x154 [ 1220.754049] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1220.759963] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1220.766532] print_address_description+0x60/0x226 [ 1220.771625] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1220.778291] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1220.784823] __kasan_report.cold+0x1a/0x41 [ 1220.789080] ? lock_acquire+0x121/0x360 [ 1220.793231] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1220.799045] memset+0x20/0x40 [ 1220.802404] __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1220.808055] ext4_mark_inode_dirty+0x471/0x7f0 [ 1220.813350] ? ext4_expand_extra_isize+0x500/0x500 [ 1220.818850] ? ext4_evict_inode+0x5a8/0x1560 [ 1220.823895] ? ext4_journal_check_start+0x13d/0x1e0 [ 1220.829431] ? __ext4_journal_start_sb+0x120/0x490 [ 1220.834475] ext4_evict_inode+0x6a6/0x1560 [ 1220.838979] ? ext4_journalled_write_end+0x1230/0x1230 [ 1220.844435] ? ext4_journalled_write_end+0x1230/0x1230 [ 1220.850115] evict+0x2cb/0x5f0 [ 1220.855706] iput+0x385/0x7f0 [ 1220.859523] ? ext4_mark_dquot_dirty+0x190/0x190 [ 1220.864503] do_unlinkat+0x376/0x5e0 [ 1220.868325] ? do_rmdir+0x340/0x340 [ 1220.872535] ? do_syscall_64+0x43/0x520 [ 1220.876527] ? SyS_unlinkat+0x70/0x70 [ 1220.880460] do_syscall_64+0x19b/0x520 [ 1220.884402] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1220.889775] RIP: 0033:0x45a387 [ 1220.893671] RSP: 002b:00007ffd0b7f5938 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 1220.901489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a387 [ 1220.909126] RDX: 00007ffd0b7f5950 RSI: 00007ffd0b7f5950 RDI: 00007ffd0b7f59e0 [ 1220.916730] RBP: 0000000000000170 R08: 0000000000000000 R09: 0000000000000010 [ 1220.924123] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffd0b7f6a70 [ 1220.931411] R13: 0000000001a94940 R14: 0000000000000000 R15: 00007ffd0b7f6a70 [ 1220.938868] [ 1220.940511] The buggy address belongs to the page: [ 1220.945448] page:ffffea00065d8a80 count:2 mapcount:0 mapping:ffff8881d9ac0950 index:0x45b [ 1220.953882] flags: 0x400000000000203a(referenced|dirty|lru|active|private) [ 1220.961049] raw: 400000000000203a ffff8881d9ac0950 000000000000045b 00000002ffffffff [ 1220.969250] raw: ffffea00066782a0 ffffea00065da9a0 ffff88819890f540 ffff8881da81aa80 [ 1220.977274] page dumped because: kasan: bad access detected [ 1220.982992] page->mem_cgroup:ffff8881da81aa80 [ 1220.987495] [ 1220.989129] Memory state around the buggy address: [ 1220.994067] ffff88819762af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1221.001719] ffff88819762af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1221.009179] >ffff88819762b000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1221.016818] ^ [ 1221.020248] ffff88819762b080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1221.027791] ffff88819762b100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1221.035246] ================================================================== [ 1221.042953] Disabling lock debugging due to kernel taint [ 1221.068685] EXT4-fs (sda1): Ignoring removed nobh option [ 1221.103939] EXT4-fs (sda1): required extra inode space not available runtime: unexpected return pc for runtime.gopark called from 0x0 fatal error: unknown caller pc runtime stack: [ 1221.180149] EXT4-fs (sda1): re-mounted. Opts: usrjquota=,oldalloc,block_validity,debug_want_extra_isize=0x000000000000f5ff,grpid,test_dummy_encryption,noquota,nobh, runtime.throw(0x8ecf5f, 0x11) [ 1221.263501] EXT4-fs (sda1): required extra inode space not available /syzkaller/go/src/runtime/panic.go:605 +0x95 [ 1221.307461] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300, [ 1221.409735] EXT4-fs (sda1): required extra inode space not available runtime.gentraceback(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc421897e00, 0x0, 0x0, 0x7fffffff, 0xc420123de0, 0x0, 0x0, ...) /syzkaller/go/src/runtime/traceback.go:285 +0x19b2 runtime.scanstack(0xc421897e00, 0xc42001c560) /syzkaller/go/src/runtime/mgcmark.go:779 +0x154 runtime.scang(0xc421897e00, 0xc42001c560) /syzkaller/go/src/runtime/proc.go:859 +0x1f6 runtime.markroot.func1() /syzkaller/go/src/runtime/mgcmark.go:264 +0x6d runtime.systemstack(0xc420123f00) /syzkaller/go/src/runtime/asm_amd64.s:360 +0xab runtime.markroot(0xc42001c560, 0xa2) /syzkaller/go/src/runtime/mgcmark.go:245 +0x308 runtime.gcDrain(0xc42001c560, 0x5) /syzkaller/go/src/runtime/mgcmark.go:912 +0xd4 runtime.gcBgMarkWorker.func2() /syzkaller/go/src/runtime/mgc.go:1794 +0x1a9 runtime.systemstack(0xc42001b300) /syzkaller/go/src/runtime/asm_amd64.s:344 +0x79 runtime.mstart() /syzkaller/go/src/runtime/proc.go:1125 goroutine 7 [GC worker (idle)]: runtime.systemstack_switch() /syzkaller/go/src/runtime/asm_amd64.s:298 fp=0xc420025748 sp=0xc420025740 pc=0x459df0 runtime.gcBgMarkWorker(0xc42001b300) /syzkaller/go/src/runtime/mgc.go:1760 +0x202 fp=0xc4200257d8 sp=0xc420025748 pc=0x419ab2 runtime.goexit() /syzkaller/go/src/runtime/asm_amd64.s:2337 +0x1 fp=0xc4200257e0 sp=0xc4200257d8 pc=0x45c971 created by runtime.gcBgMarkStartWorkers /syzkaller/go/src/runtime/mgc.go:1655 +0x7e goroutine 1 [select]: main.(*Fuzzer).pollLoop(0xc4201c6420) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:320 +0x170 main.main() /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:262 +0x1322 goroutine 19 [syscall, 20 minutes]: os/signal.signal_recv(0x0) /syzkaller/go/src/runtime/sigqueue.go:131 +0xa6 os/signal.loop() /syzkaller/go/src/os/signal/signal_unix.go:22 +0x22 created by os/signal.init.0 /syzkaller/go/src/os/signal/signal_unix.go:28 +0x41 goroutine 10 [chan receive, 20 minutes]: main.main.func1(0xc42005a120) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:137 +0x34 created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:135 +0x53c goroutine 9 [chan receive, 20 minutes]: github.com/google/syzkaller/pkg/osutil.HandleInterrupts.func1(0xc42005a120) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/osutil/osutil_unix.go:74 +0xed created by github.com/google/syzkaller/pkg/osutil.HandleInterrupts /syzkaller/gopath/src/github.com/google/syzkaller/pkg/osutil/osutil_unix.go:71 +0x3f goroutine 24 [select, 20 minutes, locked to thread]: runtime.gopark(0x99fc08, 0x0, 0x8c35da, 0x6, 0x18, 0x1) /syzkaller/go/src/runtime/proc.go:277 +0x12c runtime.selectgo(0xc420291f50, 0xc420288060) /syzkaller/go/src/runtime/select.go:395 +0x1138 runtime.ensureSigM.func1() /syzkaller/go/src/runtime/signal_unix.go:511 +0x220 runtime.goexit() /syzkaller/go/src/runtime/asm_amd64.s:2337 +0x1 goroutine 25 [IO wait]: internal/poll.runtime_pollWait(0x7f9474d64d30, 0x72, 0x0) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc4201beb98, 0x72, 0xffffffffffffff00, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc4201beb98, 0xc42018a000, 0x1000, 0x1000) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc4201beb80, 0xc42018a000, 0x1000, 0x1000, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a net.(*netFD).Read(0xc4201beb80, 0xc42018a000, 0x1000, 0x1000, 0xc42001a000, 0xc42001a070, 0xc42001a000) /syzkaller/go/src/net/fd_unix.go:202 +0x52 net.(*conn).Read(0xc42006a1e0, 0xc42018a000, 0x1000, 0x1000, 0x0, 0x0, 0x0) /syzkaller/go/src/net/net.go:176 +0x6d bufio.(*Reader).fill(0xc4200504e0) /syzkaller/go/src/bufio/bufio.go:97 +0x11a bufio.(*Reader).ReadByte(0xc4200504e0, 0x0, 0x80fac0, 0xc420029500) /syzkaller/go/src/bufio/bufio.go:239 +0x39 compress/flate.(*decompressor).moreBits(0xc42001c600, 0xc420121ad0, 0x7b0344) /syzkaller/go/src/compress/flate/inflate.go:694 +0x37 compress/flate.(*decompressor).nextBlock(0xc42001c600) /syzkaller/go/src/compress/flate/inflate.go:303 +0x39 compress/flate.(*decompressor).Read(0xc42001c600, 0xc420346000, 0x1000, 0x1000, 0xc4217d7880, 0xc4318f8c20, 0x97) /syzkaller/go/src/compress/flate/inflate.go:347 +0x72 github.com/google/syzkaller/pkg/rpctype.(*flateConn).Read(0xc420159650, 0xc420346000, 0x1000, 0x1000, 0x99eb40, 0xc420121c18, 0x42a8e8) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/rpctype/rpc.go:131 +0x51 bufio.(*Reader).Read(0xc420050540, 0xc4200687a0, 0x1, 0x9, 0xc420121ca8, 0x42a8e8, 0x99eb40) /syzkaller/go/src/bufio/bufio.go:213 +0x30b io.ReadAtLeast(0xbea6a0, 0xc420050540, 0xc4200687a0, 0x1, 0x9, 0x1, 0xc42001a000, 0xc42a7dcab0, 0x199) /syzkaller/go/src/io/io.go:309 +0x86 io.ReadFull(0xbea6a0, 0xc420050540, 0xc4200687a0, 0x1, 0x9, 0xc420121d10, 0x4043ab, 0x3) /syzkaller/go/src/io/io.go:327 +0x58 encoding/gob.decodeUintReader(0xbea6a0, 0xc420050540, 0xc4200687a0, 0x9, 0x9, 0xc420121d88, 0x42a229, 0xc400000008, 0xc42004c300) /syzkaller/go/src/encoding/gob/decode.go:120 +0x63 encoding/gob.(*Decoder).recvMessage(0xc420114e80, 0xc420121da0) /syzkaller/go/src/encoding/gob/decoder.go:80 +0x57 encoding/gob.(*Decoder).decodeTypeSequence(0xc420114e80, 0x99fd00, 0xc420114e80) /syzkaller/go/src/encoding/gob/decoder.go:144 +0x14c encoding/gob.(*Decoder).DecodeValue(0xc420114e80, 0x806dc0, 0xc42017eb10, 0x16, 0x0, 0x0) /syzkaller/go/src/encoding/gob/decoder.go:212 +0xe6 encoding/gob.(*Decoder).Decode(0xc420114e80, 0x806dc0, 0xc42017eb10, 0x0, 0x0) /syzkaller/go/src/encoding/gob/decoder.go:189 +0x16d net/rpc.(*gobClientCodec).ReadResponseHeader(0xc420159c20, 0xc42017eb10, 0xc42a7dca80, 0x0) /syzkaller/go/src/net/rpc/client.go:223 +0x45 net/rpc.(*Client).input(0xc420050600) /syzkaller/go/src/net/rpc/client.go:109 +0xb5 created by net/rpc.NewClientWithCodec /syzkaller/go/src/net/rpc/client.go:201 +0xc5 goroutine 28 [IO wait]: internal/poll.runtime_pollWait(0x7f94745be540, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc4277160b8, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc4277160b8, 0xc42c258a01, 0xc, 0xc) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc4277160a0, 0xc42c258a70, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc4245e2010, 0xc42c258a70, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc4245e2010, 0xc42c258a70, 0xc, 0xc, 0xc42c258a70, 0xc42f7b8380, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d io.ReadAtLeast(0xbeb620, 0xc4245e2010, 0xc42c258a70, 0xc, 0xc, 0xc, 0x869760, 0xc420039401, 0xc42c258a70) /syzkaller/go/src/io/io.go:309 +0x86 io.ReadFull(0xbeb620, 0xc4245e2010, 0xc42c258a70, 0xc, 0xc, 0x0, 0x0, 0xc420039670) /syzkaller/go/src/io/io.go:327 +0x58 github.com/google/syzkaller/pkg/ipc.(*command).exec(0xc42ae5e070, 0xc42f9cc260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x410917, 0xc42b922000, 0x3, ...) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:748 +0x28c github.com/google/syzkaller/pkg/ipc.(*Env).Exec(0xc4202f3290, 0xc42f9cc260, 0xc4217d6f00, 0x5, 0x30, 0xc42abdf4a0, 0x7f9474623bf0, 0x0, 0x411150, 0x50000c42f7b8380) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:280 +0x10c main.(*Proc).executeRaw(0xc421e62300, 0xc42f9cc260, 0xc4217d6f00, 0x4, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:292 +0x209 main.(*Proc).execute(0xc421e62300, 0xc42f9cc260, 0xc4217d6f00, 0x0, 0x4, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:255 +0x67 main.(*Proc).triageInput.func1(0xc4217d6f00, 0x0, 0xc420063040) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:152 +0x95 github.com/google/syzkaller/prog.Minimize.func1(0xc4217d6f00, 0x0, 0xbf98a0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:20 +0xac github.com/google/syzkaller/prog.(*PtrType).minimize(0xeed6a0, 0xc4217d6e80, 0xbf98a0, 0xc431085020, 0xc42c2580c8, 0x5, 0x5) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:144 +0x176 github.com/google/syzkaller/prog.(*minimizeArgsCtx).do(0xc4217d6e80, 0xbf98a0, 0xc431085020, 0xc42c2580c8, 0x5, 0xc42c2580c0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:99 +0x1dc github.com/google/syzkaller/prog.Minimize(0xc427116000, 0x0, 0x700, 0xc425095660, 0x7f94733b0290, 0x74c) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:47 +0x269 main.(*Proc).triageInput(0xc421e62300, 0xc427459680) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:149 +0xae5 main.(*Proc).loop(0xc421e62300) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:78 +0x1dc created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:259 +0x1153 goroutine 29 [IO wait]: internal/poll.runtime_pollWait(0x7f94745bea80, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc4342784c8, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc4342784c8, 0xc42c258901, 0xc, 0xc) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc4342784b0, 0xc42c2589c0, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc4245e21a8, 0xc42c2589c0, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc4245e21a8, 0xc42c2589c0, 0xc, 0xc, 0xc42c2589c0, 0xc420029500, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d io.ReadAtLeast(0xbeb620, 0xc4245e21a8, 0xc42c2589c0, 0xc, 0xc, 0xc, 0x869760, 0xc42ca23001, 0xc42c2589c0) /syzkaller/go/src/io/io.go:309 +0x86 io.ReadFull(0xbeb620, 0xc4245e21a8, 0xc42c2589c0, 0xc, 0xc, 0x0, 0x0, 0xc42ca232c0) /syzkaller/go/src/io/io.go:327 +0x58 github.com/google/syzkaller/pkg/ipc.(*command).exec(0xc4306861c0, 0xc42f9cc500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42a8e8, 0x40b5e6, 0x3, ...) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:748 +0x28c github.com/google/syzkaller/pkg/ipc.(*Env).Exec(0xc4202f3d40, 0xc42f9cc500, 0xc42da7d8c0, 0x4, 0x7c2878, 0xc4201c6530, 0xc42da7d8c0, 0xc42b6d3a58, 0xffffffffffffffff, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:280 +0x10c main.(*Proc).executeRaw(0xc421e623c0, 0xc42f9cc500, 0xc42da7d8c0, 0x4, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:292 +0x209 main.(*Proc).execute(0xc421e623c0, 0xc42f9cc500, 0xc42da7d8c0, 0x0, 0x4, 0xc42b6d3a40) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:255 +0x67 main.(*Proc).triageInput.func1(0xc42da7d8c0, 0x2, 0xc420063040) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:152 +0x95 github.com/google/syzkaller/prog.Minimize.func1(0xc42da7d8c0, 0x2, 0xbf98a0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:20 +0xac github.com/google/syzkaller/prog.(*PtrType).minimize(0xf9dfe0, 0xc42e510280, 0xbf98a0, 0xc42dce3500, 0xc42b0eeba0, 0x15, 0x15) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:144 +0x176 github.com/google/syzkaller/prog.(*minimizeArgsCtx).do(0xc42e510280, 0xbf98a0, 0xc42dce3500, 0xc42b0eeba0, 0x15, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:99 +0x1dc github.com/google/syzkaller/prog.(*StructType).minimize(0xd2b840, 0xc42e510280, 0xbf9860, 0xc42dce34d0, 0xc42d447460, 0xd, 0xd) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:124 +0xa8 github.com/google/syzkaller/prog.(*minimizeArgsCtx).do(0xc42e510280, 0xbf9860, 0xc42dce34d0, 0xc42d447460, 0xd, 0xc42ca23820) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:99 +0x1dc github.com/google/syzkaller/prog.(*PtrType).minimize(0xe8ffe0, 0xc42e510280, 0xbf98a0, 0xc42dce34a0, 0xc42d447430, 0xc, 0xc) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:150 +0x294 github.com/google/syzkaller/prog.(*minimizeArgsCtx).do(0xc42e510280, 0xbf98a0, 0xc42dce34a0, 0xc42d447430, 0xc, 0xc42d447420) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:99 +0x1dc github.com/google/syzkaller/prog.(*ArrayType).minimize(0x10cf440, 0xc42e510280, 0xbf9860, 0xc42dce3380, 0xc42d4473c0, 0x9, 0x9) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:172 +0x1da github.com/google/syzkaller/prog.(*minimizeArgsCtx).do(0xc42e510280, 0xbf9860, 0xc42dce3380, 0xc42d4473c0, 0x9, 0xc42ca23a28) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:99 +0x1dc github.com/google/syzkaller/prog.(*PtrType).minimize(0xe8ff80, 0xc42e510280, 0xbf98a0, 0xc42dce3350, 0xc42d4473a0, 0x8, 0x8) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:150 +0x294 github.com/google/syzkaller/prog.(*minimizeArgsCtx).do(0xc42e510280, 0xbf98a0, 0xc42dce3350, 0xc42d4473a0, 0x8, 0xc42d447378) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:99 +0x1dc github.com/google/syzkaller/prog.Minimize(0xc42d66bac0, 0x2, 0x200, 0xc42a49d780, 0x7f94721bfb28, 0x234) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:47 +0x269 main.(*Proc).triageInput(0xc421e623c0, 0xc42dd17da0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:149 +0xae5 main.(*Proc).loop(0xc421e623c0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:78 +0x1dc created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:259 +0x1153 goroutine 30 [runnable]: internal/poll.runtime_pollWait(0x7f9474d64df0, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc428059058, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc428059058, 0xc42a585f01, 0xc, 0xc) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc428059040, 0xc42a585fc0, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc42006ac48, 0xc42a585fc0, 0xc, 0xc, 0x0, 0x0, 0xc4310f1968) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc42006ac48, 0xc42a585fc0, 0xc, 0xc, 0xc42a585fc0, 0xc42f7b8380, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d io.ReadAtLeast(0xbeb620, 0xc42006ac48, 0xc42a585fc0, 0xc, 0xc, 0xc, 0x869760, 0xc4310f1901, 0xc42a585fc0) /syzkaller/go/src/io/io.go:309 +0x86 io.ReadFull(0xbeb620, 0xc42006ac48, 0xc42a585fc0, 0xc, 0xc, 0x0, 0x0, 0xc4310f1c28) /syzkaller/go/src/io/io.go:327 +0x58 github.com/google/syzkaller/pkg/ipc.(*command).exec(0xc430f667e0, 0xc4200142a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42a8e8, 0x40b5e6, 0x3, ...) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:748 +0x28c github.com/google/syzkaller/pkg/ipc.(*Env).Exec(0xc42b51a1b0, 0xc4200142a0, 0xc4217d77c0, 0x3, 0x7c2878, 0xc4201c6530, 0xc42a68f880, 0xc42b6d39f8, 0x42d61b, 0xc4310f1d80) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:280 +0x10c main.(*Proc).executeRaw(0xc421e62480, 0xc4200142a0, 0xc4217d77c0, 0x2, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:292 +0x209 main.(*Proc).execute(0xc421e62480, 0xc4200142a0, 0xc4217d77c0, 0x1, 0x2, 0xc42b6d39e0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:255 +0x67 main.(*Proc).loop(0xc421e62480) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:80 +0x231 created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:259 +0x1153 goroutine 31 [IO wait]: internal/poll.runtime_pollWait(0x7f9474d64a30, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc42d0240b8, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc42d0240b8, 0xc42a585001, 0xc, 0xc) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc42d0240a0, 0xc42a5850a0, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc42006a118, 0xc42a5850a0, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc42006a118, 0xc42a5850a0, 0xc, 0xc, 0xc42a5850a0, 0xc42f7b8380, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d io.ReadAtLeast(0xbeb620, 0xc42006a118, 0xc42a5850a0, 0xc, 0xc, 0xc, 0x869760, 0xc42ca25901, 0xc42a5850a0) /syzkaller/go/src/io/io.go:309 +0x86 io.ReadFull(0xbeb620, 0xc42006a118, 0xc42a5850a0, 0xc, 0xc, 0x0, 0x0, 0xc42ca25b80) /syzkaller/go/src/io/io.go:327 +0x58 github.com/google/syzkaller/pkg/ipc.(*command).exec(0xc424166070, 0xc4200142a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc42ca25c10, 0xc42f7b8380, 0x3, ...) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:748 +0x28c github.com/google/syzkaller/pkg/ipc.(*Env).Exec(0xc42b51a360, 0xc4200142a0, 0xc42da7dc40, 0x1, 0x4dfb33, 0xc4271b0a00, 0x7f3fe585601babb8, 0x741cef, 0x8bf709, 0x4) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:280 +0x10c main.(*Proc).executeRaw(0xc421e62680, 0xc4200142a0, 0xc42da7dc40, 0x5, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:292 +0x209 main.(*Proc).execute(0xc421e62680, 0xc4200142a0, 0xc42da7dc40, 0x0, 0x5, 0x1) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:255 +0x67 main.(*Proc).smashInput(0xc421e62680, 0xc42757c5b0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:219 +0x1ec main.(*Proc).loop(0xc421e62680) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:82 +0x1a5 created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:259 +0x1153 goroutine 6293 [IO wait, 4 minutes]: internal/poll.runtime_pollWait(0x7f94745bef00, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc42d024018, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc42d024018, 0xc436d02001, 0x20000, 0x20000) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc42d024000, 0xc436d02000, 0x20000, 0x20000, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc42006a060, 0xc436d02000, 0x20000, 0x20000, 0xc4200266b8, 0xc420026710, 0x101) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc42006a060, 0xc436d02000, 0x20000, 0x20000, 0x20000, 0x20000, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d github.com/google/syzkaller/pkg/ipc.makeCommand.func2(0xc42006a060, 0xc424166070) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:594 +0xc6 created by github.com/google/syzkaller/pkg/ipc.makeCommand /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:588 +0x8c0 goroutine 32 [IO wait]: internal/poll.runtime_pollWait(0x7f9474d645b0, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc4307420b8, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc4307420b8, 0xc42d447301, 0xc, 0xc) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc4307420a0, 0xc42d447300, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc428ba4018, 0xc42d447300, 0xc, 0xc, 0x0, 0x0, 0x0) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc428ba4018, 0xc42d447300, 0xc, 0xc, 0xc42d447300, 0xc42f7b8380, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d io.ReadAtLeast(0xbeb620, 0xc428ba4018, 0xc42d447300, 0xc, 0xc, 0xc, 0x869760, 0xc4310ef901, 0xc42d447300) /syzkaller/go/src/io/io.go:309 +0x86 io.ReadFull(0xbeb620, 0xc428ba4018, 0xc42d447300, 0xc, 0xc, 0x0, 0x0, 0xc4310efb80) /syzkaller/go/src/io/io.go:327 +0x58 github.com/google/syzkaller/pkg/ipc.(*command).exec(0xc42ae5e000, 0xc4200142a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, ...) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:748 +0x28c github.com/google/syzkaller/pkg/ipc.(*Env).Exec(0xc42b51a5a0, 0xc4200142a0, 0xc42ce2bd00, 0x8, 0x4dfb33, 0xc42007f500, 0x77144385163954e8, 0x741cef, 0x8bf709, 0x4) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:280 +0x10c main.(*Proc).executeRaw(0xc421e62740, 0xc4200142a0, 0xc42ce2bd00, 0x5, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:292 +0x209 main.(*Proc).execute(0xc421e62740, 0xc4200142a0, 0xc42ce2bd00, 0x0, 0x5, 0x1) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:255 +0x67 main.(*Proc).smashInput(0xc421e62740, 0xc42b7ae640) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:219 +0x1ec main.(*Proc).loop(0xc421e62740) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:82 +0x1a5 created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:259 +0x1153 goroutine 33 [wait for GC cycle]: runtime.GC() /syzkaller/go/src/runtime/mgc.go:1070 +0x250 runtime/debug.freeOSMemory() /syzkaller/go/src/runtime/mheap.go:1183 +0x22 runtime/debug.FreeOSMemory() /syzkaller/go/src/runtime/debug/garbage.go:100 +0x20 main.(*Proc).executeRaw(0xc421e63000, 0xc42f9ccfe0, 0xc42da7ddc0, 0x4, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:298 +0x19d [ 1222.038756] Kernel panic - not syncing: panic_on_warn set ... [ 1222.038756] [ 1222.046418] CPU: 1 PID: 13019 Comm: syz-executor.1 Tainted: G B 4.14.154+ #0 [ 1222.056072] Call Trace: [ 1222.059020] dump_stack+0xe5/0x154 [ 1222.062780] panic+0x1f1/0x3da [ 1222.066103] ? add_taint.cold+0x16/0x16 [ 1222.070092] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1222.075806] ? ___preempt_schedule+0x16/0x18 [ 1222.080249] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 main.(*Proc).execute(0xc421e63000, 0xc42f9ccfe0, 0xc42da7ddc0, 0x0, 0x4, 0x5) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:255 +0x67 main.(*Proc).triageInput.func1(0xc42da7ddc0, 0x17, 0xc42ca279d0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:152 +0x95 github.com/google/syzkaller/prog.Minimize.func1(0xc42da7ddc0, 0x17, 0xc42cee2460) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:20 +0xac github.com/google/syzkaller/prog.minimizeInt(0xc42d028440, 0xbf97e0, 0xc42e631cc0, 0xc42a585248, 0x7, 0x7) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:212 +0xc2 github.com/google/syzkaller/prog.(*IntType).minimize(0x140e520, 0xc42d028440, 0xbf97e0, 0xc42e631cc0, 0xc42a585248, 0x7, 0x7) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:180 +0x53 github.com/google/syzkaller/prog.(*minimizeArgsCtx).do(0xc42d028440, 0xbf97e0, 0xc42e631cc0, 0xc42a585248, 0x7, 0xc42a585240) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:99 +0x1dc github.com/google/syzkaller/prog.Minimize(0xc428d61ac0, 0x17, 0x600, 0xc42e5198e0, 0x7f946d9c9d74, 0x6a0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/minimization.go:47 +0x269 main.(*Proc).triageInput(0xc421e63000, 0xc43482a720) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:149 +0xae5 main.(*Proc).loop(0xc421e63000) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:78 +0x1dc created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:259 +0x1153 goroutine 6558 [IO wait, 2 minutes]: internal/poll.runtime_pollWait(0x7f9474d642b0, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc430742018, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc430742018, 0xc423ff6001, 0x1ffcd, 0x1ffcd) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc430742000, 0xc423ff6033, 0x1ffcd, 0x1ffcd, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc428ba4008, 0xc423ff6033, 0x1ffcd, 0x1ffcd, 0x33, 0x0, 0x0) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc428ba4008, 0xc423ff6033, 0x1ffcd, 0x1ffcd, 0x33, 0x0, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d github.com/google/syzkaller/pkg/ipc.makeCommand.func2(0xc428ba4008, 0xc42ae5e000) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:594 +0xc6 created by github.com/google/syzkaller/pkg/ipc.makeCommand /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:588 +0x8c0 goroutine 7147 [select]: github.com/google/syzkaller/pkg/ipc.(*command).exec.func1(0xc424166070, 0xc426a37440, 0xc426a373e0) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:733 +0xf5 created by github.com/google/syzkaller/pkg/ipc.(*command).exec /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:731 +0x1a3 goroutine 7130 [select]: github.com/google/syzkaller/pkg/ipc.(*command).exec.func1(0xc4306861c0, 0xc4268a4d80, 0xc4268a4cc0) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:733 +0xf5 created by github.com/google/syzkaller/pkg/ipc.(*command).exec /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:731 +0x1a3 goroutine 5419 [IO wait, 1 minutes]: internal/poll.runtime_pollWait(0x7f9474d64430, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc428058fb8, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc428058fb8, 0xc42e09db01, 0x1e4b8, 0x1e4b8) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc428058fa0, 0xc42e09db48, 0x1e4b8, 0x1e4b8, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc42006ac30, 0xc42e09db48, 0x1e4b8, 0x1e4b8, 0x33, 0x0, 0x0) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc42006ac30, 0xc42e09db48, 0x1e4b8, 0x1e4b8, 0x33, 0x0, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d github.com/google/syzkaller/pkg/ipc.makeCommand.func2(0xc42006ac30, 0xc430f667e0) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:594 +0xc6 created by github.com/google/syzkaller/pkg/ipc.makeCommand /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:588 +0x8c0 goroutine 7142 [select]: github.com/google/syzkaller/pkg/ipc.(*command).exec.func1(0xc42ae5e000, 0xc426a36a80, 0xc426a369c0) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:733 +0xf5 created by github.com/google/syzkaller/pkg/ipc.(*command).exec /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:731 +0x1a3 goroutine 6396 [IO wait, 4 minutes]: internal/poll.runtime_pollWait(0x7f9474d64730, 0x72, 0x1) /syzkaller/go/src/runtime/netpoll.go:173 +0x57 internal/poll.(*pollDesc).wait(0xc434278428, 0x72, 0xffffffffffffff01, 0xbecca0, 0xbdc060) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:85 +0xae internal/poll.(*pollDesc).waitRead(0xc434278428, 0xc43108a001, 0x20000, 0x20000) /syzkaller/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d internal/poll.(*FD).Read(0xc434278410, 0xc43108a000, 0x20000, 0x20000, 0x0, 0x0, 0x0) /syzkaller/go/src/internal/poll/fd_unix.go:125 +0x18a os.(*File).read(0xc4245e2188, 0xc43108a000, 0x20000, 0x20000, 0xc420023eb8, 0xc420023f10, 0x101) /syzkaller/go/src/os/file_unix.go:216 +0x4e os.(*File).Read(0xc4245e2188, 0xc43108a000, 0x20000, 0x20000, 0x20000, 0x20000, 0x0) /syzkaller/go/src/os/file.go:103 +0x6d github.com/google/syzkaller/pkg/ipc.makeCommand.func2(0xc4245e2188, 0xc4306861c0) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:594 +0xc6 created by github.com/google/syzkaller/pkg/ipc.makeCommand /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:588 +0x8c0 goroutine 7148 [select]: github.com/google/syzkaller/pkg/ipc.(*command).exec.func1(0xc430f667e0, 0xc426a37980, 0xc426a37620) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:733 +0xf5 created by github.com/google/syzkaller/pkg/ipc.(*command).exec /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:731 +0x1a3 goroutine 6637 [IO wait (scan), 2 minutes]: runtime.gopark(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/go/src/runtime/proc.go:277 +0x12c created by github.com/google/syzkaller/pkg/ipc.makeCommand /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:588 +0x8c0 goroutine 7131 [select]: github.com/google/syzkaller/pkg/ipc.(*command).exec.func1(0xc42ae5e070, 0xc4268a4e40, 0xc4268a4de0) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:733 +0xf5 created by github.com/google/syzkaller/pkg/ipc.(*command).exec /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:731 +0x1a3 [ 1222.086076] end_report+0x43/0x49 [ 1222.089622] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1222.095431] __kasan_report.cold+0xd/0x41 [ 1222.099618] ? lock_acquire+0x121/0x360 [ 1222.103693] ? __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1222.109574] memset+0x20/0x40 [ 1222.112696] __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 [ 1222.118254] ext4_mark_inode_dirty+0x471/0x7f0 [ 1222.123004] ? ext4_expand_extra_isize+0x500/0x500 [ 1222.127947] ? ext4_evict_inode+0x5a8/0x1560 [ 1222.132371] ? ext4_journal_check_start+0x13d/0x1e0 [ 1222.137394] ? __ext4_journal_start_sb+0x120/0x490 [ 1222.142339] ext4_evict_inode+0x6a6/0x1560 [ 1222.146591] ? ext4_journalled_write_end+0x1230/0x1230 [ 1222.151888] ? ext4_journalled_write_end+0x1230/0x1230 [ 1222.157180] evict+0x2cb/0x5f0 [ 1222.160397] iput+0x385/0x7f0 [ 1222.163626] ? ext4_mark_dquot_dirty+0x190/0x190 [ 1222.168473] do_unlinkat+0x376/0x5e0 [ 1222.172201] ? do_rmdir+0x340/0x340 [ 1222.175857] ? do_syscall_64+0x43/0x520 [ 1222.179938] ? SyS_unlinkat+0x70/0x70 [ 1222.183749] do_syscall_64+0x19b/0x520 [ 1222.187661] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1222.192857] RIP: 0033:0x45a387 [ 1222.196048] RSP: 002b:00007ffd0b7f5938 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 1222.204315] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a387 [ 1222.211715] RDX: 00007ffd0b7f5950 RSI: 00007ffd0b7f5950 RDI: 00007ffd0b7f59e0 [ 1222.219105] RBP: 0000000000000170 R08: 0000000000000000 R09: 0000000000000010 [ 1222.226466] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffd0b7f6a70 [ 1222.233746] R13: 0000000001a94940 R14: 0000000000000000 R15: 00007ffd0b7f6a70 [ 1222.243511] Kernel Offset: 0x34200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1222.254934] Rebooting in 86400 seconds..