74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:23:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000080)="0af51f02a070004f0331f9856a096558007971ed0acfbd4f7ac411") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x4e23, @local}}}, 0x88) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002b24ddbb6919c0b00950000000000000000000000000000000000000000000000000000000000000000003345c083eb7a7efa033e94"], 0x1}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="a32ef135f751a867bcedfefef63c82b0", 0x0, 0x0, 0x2, 0x1, 0x4c, 0x1}, 0x20) 00:23:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7ff, 0x1000000000000004, 0x125, 0x3, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x42, 0x10107e) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x7ff, 0x0, 0x0, 0x2000000, &(0x7f0000000740)={[{@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@fat=@errors_remount='errors=remount-ro'}, {@dots='dots'}, {@fat=@dmask={'dmask', 0x3d, 0x7fffffff}}, {@dots='dots'}], [{@dont_appraise='dont_appraise'}, {@fowner_gt={'fowner>', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}]}) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) socket$nl_generic(0x10, 0x3, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000bc0)={'syz0\x00'}, 0x45c) 00:23:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048}, {0x6}]}, 0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r2, 0x2, 0x1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r0, &(0x7f0000003040), 0xd51a3a1c7759bc34, 0x0) r3 = dup(r1) inotify_add_watch(r3, &(0x7f0000000080)='./file0\x00', 0x22000000) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000180)={{{@in, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f00000000c0)=0xe8) [ 116.174924] FAT-fs (loop3): Unrecognized mount option "dont_appraise" or missing value 00:23:59 executing program 5: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getegid() mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) mremap(&(0x7f00003d8000/0x4000)=nil, 0x4000, 0x1000, 0x4, &(0x7f0000fd7000/0x1000)=nil) 00:23:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001a80)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000001ac0)) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0xc2000, 0x0) r5 = openat$cgroup_type(r4, &(0x7f0000000540)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bind(r4, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x2711}, 0x80) ioctl$KDDELIO(r4, 0x4b35, 0x5) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000080)='.\x00', 0xfe) write$P9_RREADLINK(r4, &(0x7f0000000040)=ANY=[], 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x12, r6, 0x0) ioctl$int_out(r5, 0x5462, &(0x7f0000000040)) r7 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x80) write$binfmt_elf64(r7, &(0x7f0000000480)=ANY=[], 0x2e7) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r7, 0x40086200, &(0x7f00000003c0)=0x1) sched_setaffinity(r8, 0x8, &(0x7f0000000200)=0x9) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') r10 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x20000, 0x8) sendfile(r7, r7, &(0x7f00000000c0), 0xa198) sendmsg$netlink(r4, &(0x7f0000000500)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc, &(0x7f0000001980)=[{&(0x7f00000002c0)={0x8c, 0x3e, 0x4, 0x70bd27, 0x25dfdbfe, "", [@generic="67e00b58c20ab30079820f2604ce237705b134f50b16efdc1789bdd90f9d32f03ae59a5513291aa1e46d04c5924c077c440ce832b60b76b1efb4036d12cf8aba2ffe7eb1aadb20e3e148d21c46afcb7027b4b32952730411d0e3b0fabfe510dd4c1f366ceb5b956e7372c6edee2980d6b0e0", @typed={0x8, 0x1, @uid=r9}]}, 0x8c}, {&(0x7f0000000140)={0x10, 0x36, 0x0, 0x70bd2c, 0x25dfdbfc}, 0x10}, {&(0x7f0000000580)={0xd4, 0x32, 0x300, 0x70bd2a, 0x25dfdbfe, "", [@generic="5e6fd7b1d483e03f0bfad32b74fa1f15efd158d8a366d31ca3f3375da0816c10608be962fd0298cbddaa15be20e416a80c0214e6b88859b40dc50ec6d2810a8e4e0b8839f821c6c97e42f88dcb9233bbc03403dddf0fd6a7e83bbc65cffe81bae14300661d3488285d9d3d472b1cc7dff5cc043b4bc0a8b5d5a32774e58159ed8551d3f74baadcc907b5577a7de48904acad0f459dcade5440068cab36cbe5e17930de9dd903c69dc214bb74b43f73f103e9e151af7bbe3a8c502d7df5736e4a70"]}, 0xd4}, {&(0x7f0000000680)={0x1d8, 0x26, 0x400, 0x70bd28, 0x25dfdbfb, "", [@typed={0x8, 0x58, @pid=r8}, @typed={0x4, 0x7e}, @typed={0x8, 0x23, @ipv4=@empty}, @typed={0xdc, 0x79, @binary="b73b2380e89425f84f623dc13808e11150c779652b7dfe7d86185e80bd3d490bfeb09023d44ca5f21c1146c1d0cc706e3c5925415772c68a53a2d839ef5dfbf093f122a002ec92caf859a25a26cd379cca7387b9f3edc49ee6478cc7d65e35138ad8ec301ac911afa3def2ff6b307a1de468c1f7a3ea2359017236f1b36d20dc2ae599fa8327db5ae23c6e9562d23fef3d05252f1f6ca19802cc46b8c0a142e2d5be91ba9c76e8a0f98efdfa56c9c7688e93e756e61742c8c6b7d15c16b0ac7fe4fc5f2ec5f65f2e26ffaecb24be7dc9bc31c5225b09b3"}, @nested={0x2c, 0x2, [@typed={0x8, 0x44, @u32=0x2}, @typed={0x14, 0x38, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0xc, 0xf, @u64=0xd919}]}, @nested={0xac, 0x49, [@typed={0x8, 0x7e, @fd=r4}, @typed={0x8, 0x1, @fd=r10}, @generic="f0eef063385b7dfc876289c1657509c4bc4f02c8d37485ccd1d6f32ccece21ed4d8c9bcc605d59c1e042da7ee96858ca467416c24e2e1d62dd8c4ef4b12050462329e77ca7b02c44d866c780fcc43478af2b356ed2f3a4eda4d92435fc61f506fbb07109030f2e4248803e89ab88be22fcc318bef7d8d0ff11fe96cc44257290a75d5b9823a1a6bff89e69de454297", @typed={0x8, 0x86, @u32=0x1}]}]}, 0x1d8}, {&(0x7f0000000880)={0x10f0, 0x3c, 0x800, 0x70bd26, 0x25dfdbfc, "", [@generic="d858fa65e6955c036184e4a3fbc60a2ba347841806eb93cc0bbb920aad858fc881b310a19a7f6d99b378cf26adde9c6e757922b9891ddbe58c920bb3bc76e880964220783f7bc5474bac2833916222f996823d844ca0729f9df2b67e090853b331cefc80e17bf77283b1689a7e1b3313b565d6b0323d140501f7de5bd748f8a15b3c26b263c9f60539969ad30f7eefd20fc47e90be837d4f28d41a76b6977a3e006f5abf250ca04dd570be856fe6fd7c7f5cc99891d06e372bfcf0d3cd29900d06600abdd2add5b048d9", @typed={0x8, 0x9, @fd=r7}, @generic="c5ffc16ad45b92b3637433809d30", @generic="cab465a470bafb87f784879b99617760beead512b95d11c502fc85fb98d87bbc0323de06c42e21c1ce75284459479b266bc27edb87baf73197ebe7f2fad1b1f138d3843d93a5718e6a56b132bb0e8283b2a7ef61bbc9bb08a9357a42e0ebf7bdf97293ccc6bcb5c4d159fbf87c72e9b4b16cd7ec883a1adda79feaa5e54804f68e05e3faf1e5cd2d09a1a583d5ce2fa79a54f095a1f146a8f4011a3d1e530e15ad31ef3408d6f791b8e9b4538f18cd5ddd5911a0a926d30d80ac73e087835216fd18213ca375791f7b740f69214af68a5645da2a4a4d7db7e51e6c3a988856b2b40f040ff76fb8d50446c397fe77f623c70df1e3a2b687bac4b95c8bc70368529e6688ebd11fc72c129f69ee7023f76cf8a4d99ba0d1af0183a7f6909ea98fbaa93f285ebe411c34c1c61544f270a97ace01baaa4aeaa1b2682cd0c067fbee5b1f092b5d21ca5200cb9b21b74a7441841a6eaedc65dbaeb810e0c0f33d7b34698b7ea98cd13ee9e2d01313b647b44d210d023d6b24c1219c592e5c5c7d6015e57bbb977b330d5320c93b6bf6607852b27c1dcd65ad028667ac773b58fca5f5dc8636c3650fc3aacfc6cfe7a7d02a07cb8b95b18576294f360c7d3000ffb74b5fbfff52a823e6ab1faef34c11d33d025b1e51cc530ba0f65a9b72e7931a8ae574a58a598f8f21feaff4fa246d3276e32dfbadb1604b1d211b9efb4bfd2d994a06a1b6df01a82047453e4108845fe27a1ee918a4885b2bdeec38b3ed3f5f2ea96653f62058f76a6a41d2f2df218d8f7d5ce3394c2fbec9ffeee197765e1db45a291dbdf351e2be8b3127774b24fc75c1ed1d89de86efd42dc7344b39510ac9c80c3880131f966063a53d987b5a54b4dcf254619062e9e304ebdf560eac8ec3715045eb08019a4682ef118272b6a3198781a7f9971f352a3eea0bb12e66c7126a8b85005b600a1e90f1be5ea9f6677e29a78475977e2fcacc54054112c892c7e8003d1e6277422ced20900876ad73e96cfdcc97ebdbe33dc453bf9898325ad8349060024bbd38d8cd00fb40f6bd624a327fc8961ffb81d6caf2b10f3842c1418b905eeae2ba3642afd904534edb15fbf72760b35789277b2dc8f2b2219008b1f978370b5548fed44a5961481d0f8955b9ffac2d216ba67421505f3e2d77a9e341316ce848439e769e0435a52e75d514d721360ea095076a794fea8303132765c75f53a575afa6b60040669d3aaa750235c1b0121bb3f14562e64d33281904e36e85317cbf4fa40617c5b1f59a011c373e3f52ff9653ec3cf9eb1be243dab29174a68bd357b8ea872a0a862c6978da099685f934ddc03cb9d7a0d17e51e7719be8b5252d0269bd18ad9d6818f75a7cdfe9f5037b8a873863c8464fec64f40d89cfe7b864121fe8365e8e8e2a8ef8aaac8ab0ae2d67f9bfbf3f7a773699f3635726b8b68cfb2fbf2ca591c299b6086dc80c1626107058e38579bb5735534d93615bb727b35b7a6fd39bdbbb3ec4f5ce0a0d18ca035e60e8f42fe5cc48db379a6fca5f8906bdb18da424164a83ac5fee8c113cdf1d489361bf923dff81a25c0e1f1a79d8160f49b54fafb890f30863f5a283b178f82ed0da85a339f454dc9ad81e6889b8d16a131e5b8634d82d54b6a8814052be7eab7e18a4f4f95d2753b8b677615bfd45517912776d20636706404f737f9130695a478d174e5f55bf7e7341a315cf060c5473219f5e14384cd9a59b4e8e3c16b690ec4cc1038df377c4861eee302fe00c7c25cebb52d9c9c1a3080d940b77e15084484926206a3fbc90560a15370fb1098e72184fb0fed8212d00728cfeab2e4d0b2afa8c81abd2d56148d055c94a358988b284d0a609c3cee2c737ff5e284e138e3eb834265a7453701ecd039b6d1a16c09738b5f52a26c3053d81ccee93f5a9013e885797d62582c66da0791d6f27c1d77ed6109997904d5db75706477a2d2f9f37c5e317a26ab2841115ef1abbbccd402da525de0482116466f0921e15b6da3d108740abe67205a5fd99eab3ad3b07c24af4b7a82a9e8b9d28cc8e98976a9dda58e38bc658a4677a2ea517d3d337a51800fe8e58b5fc9069f3757764c6e121c045b88486ac476165dd890ad3bfb9d50634f26487b5828e78e1be5c2d822f775f6861c7a76ebc0c9b569a823b964a38086ed07430a697a8346b5fa19a31448ecaca2beff0827d29089f9b5b4124d830b7c843a829e9c4ca30de28ba4acdc5c010c1164d17f5f628c2f05006e7178c6132767516c2b485024c1bca57b3499a820f805778306c61bfb76995a884a41ff1d9c16b2ee85a70db8b3336ad904380981abb044fccf0cce49bf019b3bd6f2d88aa0f0b60bfd3e12ea8521c2207e4bf1b2d2822d40bab4d5d49fed5baf1a81b748ccab5ac56f6691e65938aab2793cb839b230987f4a7ab41e7ab48e60771ad7ae790a89244574cacca70d029c84bcc6676f385a1c84c0ad92a4212de001d984c35dfa13fb85fda9c170e5fca5d923e65531fd9e75ee4ddd5462f581fb72ac780f072e0cfe80bd5c34debca1a146b00a58096861fd38666151c760e7570a03d9802ec6a8a0328ce56cfa4ed299758db681c048a47351c6089504ecc58e92bd942e6df7d6826e0b79930cf855b7dc96711aa7c9d95800171165857310267655229f527cf0876098e8ebf29f59454b2f22a1cd34decd9bb2fd2245b89fff8c6cc084b9f8cab5890beafabd2f077db0c83bcc7624331bb3327524c7555b88f22fa80b366de17ff326f539bcbcac44de7521db314224c837c78308c060ca81b4f54a3027134a21e85f508f93fb28f6134a14db2ac74bf35ae0ad0bedf5febe585180c931c1964a64a5d6e401ad531f4b7f7d55cbd1f4d252b657f9ab1f81377989900af48d68111fd707afe12bdf1b722c8a2d8d3fea6278c7250f2f2029ded4b1019a67e25ded5d016d00992ed723c52c2feddba70f0374b8a343458afc0e9512de19d0e6912fcb7abd96a0faafada18a339ab47a724d7e3ed53efcb52c0f2c802707f7af0ce3c17aaa581b8f8cc33abf41df32116bf8af433962e5b8537b82ce3a9f35f7b76d59d855fb04c16d3ccbd86ddc961eca3a14eb980a0fbd9d88e676eb6323c7905e64036746d17cd09012aa40a000adf0f8460f126bc30734f686dd92bde1e420ba6f3580363c2b49deb9be76f5e07c10193eb6990f912f26fff8fbd4b5cbd0d349316dcb322da0167d0a5a14635b5f02510f4a8a76c15d5c7d9102b849f116976438f4aca13255c1fa6421b3523b9cfca29bd3e572646f9c462659caf33816642fe73393dc1c31ccbe8b9b2870d2b1fed2bdfaa40121c70ed90d49ef7dd7ffa294f11e8a24394220c5327b7810076f6c7f6da8df108c32f6225a29893ab8b168f30aca63a3fbae5662bf26d8206069ac354a22dc61b8f2e696c7144f6095dab1ae8594a023b1b851c8f939500ad7ea6b1933626d6ae7da4ffffa6006cbd46c9138459e8ea50255757a1f5791832d0d2f90757578fcb9f1a356f54539931d012561812efb150b2c5c7015a98f5ff2b0b1cc6d6c57d5fecc2ac63b8a3320feab21991529b1563ea89ce7c824b85ae9feec867ba68292878939189cb2554ad13ccf0578048437237d922ae2b2dde98c15eecf3bcc0d6d020cd786efae51ea7585cee501ec63797d8d65af904b24f5ca8419cf00943f71d21ae015101c645a32690c637894eea5be74d65a488a9fab5fdcc2054b49182543ba79aa4ed2767cad6f807c466548b03c5b4e785ed457167aa323e1ba2fd992c4157d3b23c0b13002be56f936b72365809026abb2f6f22b1794ee366738e7f5beadc6e6ebd75330f1790a3693e0f91e559787f17a2e0abb4646ba0f771acd8b5a2e5491fa365f893229e0e11b1fcd847c46b4de1637147ba48909d4a4ba81d0dd5e97df4e5048b557ba1e1b94b3676c976c08f69ea966c93fb8e54684bd33b113cc21736ea387dc227a5d4099e2ed641f68194bb2ed5265f8c22505149a70474e586428f87570bfddbcc04e04cc0249984bdb913566a43256859efd9b9afbf498948d5e9b74f0f0c69dcd4b2cdbc66d21f887fa6f248fbfb944ba1bae030bb0030af2775d00c480c1e740fb09e7fa4a7b15b4ddcc0224b209aa121c402be7bd2fd8a174c219d78f2cdec31b155e0be5c490d408d64c3183f2019104e3dac8553c9f6923e59274da1aba29ef44e15d1137ef62f96253f75aa05de877ef730185415bb9d21b0368c37caf39b4d9eabeb929b09113b8d256cff2de6f3b13f771867752ed8bf25597aa5666378f6954ee43992f278118ae5b20afc2c3517e022e4f36e75c0366a5754b35d0f12ad503523606894640caf036b4e9421ac2b602dfa755b2bf0e90fc807f771e33b6340faf8b639ad889d277d563708f792dba5c920115c312172b688792ed882eb4174ce12aad258c558343cfeaffb31448f1bf7e5df65b0124acc47f50fc784a2210223a2f2da535d53a2aea5096a0b68cc707550c47529ca48c2dfc9a37d88f1408b3a5554a857831bff71f921336add3af54cfddf0a4a5e4253aa663fd0e651999d28076da02e9b1be754dc4b6dccf75386d16a0dbb189b1cbe8c094ca20ca2edd38334dd09fc408b67219d3669090f3e4a37d82de96ebb4d47a12698e49c7a5e2375cf2269e0e9072f470bf4f34ac9eb8414aace1500613586bdf4c99aa096742772073d6bed8d6216150bb81efe06835a28eac646b1b40772a8968deca3325d283875bfe0a90c545a57824f870f2d860b5e07cea0b7a26da1b3d2d2d9e9b1de111c9296d1eb9a0b08231c75bc2dea3614afdf4f6cea8eaf91b2fe2554d03be2bef138db61fa6c4020f3a6823218d6ecc8079888781ce2e5aaaeac80d66fecb48c940ed5812e3c20b2060432fd6c61abf04b83df9d7e413a6b0f7d62fd071caaf75c1f1c678af1518a4fa5fb8a71a131ca5828381cc8a46b272f60fbc07d7c96d22a791b6808f55c3f09ada4eec4d1a5ac4e55316820486229e0136b229bba641e0893213b29fc201160e046b1f5ebb80aa9c89918fc1e432f7ce8b797923f1801562828c545978774fc67f9a7211e8da43fc61cf9090f3d98a24cd6acb94ba52f46ba86d058ed412ddfa7c474df5471d441a0ebedb96832aed5fce9b2ff05c2d5f0989ac018c82d5354bdcefe0e019200f60f000b912205635cd77985cedb3a6b381048e4d0f73db3fc00924600fb9b0fb867940751e37b0827ea18656d7b17e6c0bed23600ba0a6301e5b478684a927daca56a06a3a0f3a92c34ddb4e8aed57a02f5563762d7757769be7894419737a2dc3b85cd79d4bd98805e6c802d93a4556c4a038b7a1b461acd39cb072849ed0b22eeee453350b73b09ad2a2de0055ce001a3fe88eb3c48d3220147d5ffd5b0b11be79e6c996c50ca789fb12d038e88e0121669c8b41705970cc856838ee5c5ea6c63e341616255137e480a064a0ff110d81dcf183a94765f36d8b6dfbcf796dc0774a4f48ca635e253778b60ee3e78e7a46309cbd6c09779b9caf0337ceb8ad77fbeae9a224e4fea471d586e9582290408347bee99f4381a6e15f5778c52366356ff57fa98d869e54a8aed36795d24d48578473d14a63ed38b76712793f48775ee8e5e89d96e5bbd35d3be9e29475cae10427756a0aea917c5a1f10a9f1ec3855a526140c5126928758e1248cf245528dbb89c7f39b9f4b03f029085561a5baceef4c31f6e5fc6f5c64d0f3af3dcd68119f7701d825403bd403baa978e8bf5a763e0407dc926a857"]}, 0x10f0}], 0x5, &(0x7f0000001a00)=[@rights={0x18, 0x1, 0x1, [r7]}, @rights={0x18, 0x1, 0x1, [r4]}, @rights={0x18, 0x1, 0x1, [r4]}], 0x48, 0x4000}, 0x8000) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="0212000002000000000000000000ab4d58f4b357f4a5bacf000008286d88804accd6382c3049dc1e532804ea158a98ca82f49bf6bb4d5bf1dc68000000000000"], 0x40}}, 0x0) dup3(r2, r1, 0x80000) 00:23:59 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x41) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f00000ff000)={0x0, r0}) recvmsg(r2, &(0x7f0000172fc8)={0x0, 0x0, 0x0}, 0x0) clock_gettime(0x0, &(0x7f0000000000)) clock_nanosleep(0x0, 0x0, 0x0, &(0x7f0000000100)) fcntl$lock(r2, 0x25, &(0x7f0000000080)={0x0, 0x0, 0x72e000000000, 0x3ff, r0}) dup2(r1, r2) r3 = gettid() tkill(r3, 0x16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f00000000c0)) 00:23:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000100)=0x6, 0x49) [ 116.306499] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 116.368685] FAT-fs (loop3): Unrecognized mount option "dont_appraise" or missing value 00:23:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) dup2(r1, r0) dup2(r0, r0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400202) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r3, 0x10e, 0xb, &(0x7f00000021c0)=""/4096, &(0x7f0000000040)=0x1000) fcntl$dupfd(r1, 0x406, r0) 00:23:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth1_to_bond\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@empty, @in6=@dev}}, {{@in=@broadcast}}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000600)={@dev}, &(0x7f0000000640)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000008c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a80)) getsockname(r2, &(0x7f0000000dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x80) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000e80)={@local, @remote}, &(0x7f0000000ec0)=0xc) ioctl$sock_ifreq(r2, 0x891d, &(0x7f00000001c0)={'nlmon0\x00', @ifru_addrs=@hci={0x1f, 0x0, 0x3}}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f40)={{{@in6=@initdev, @in6=@remote}}, {{@in=@empty}, 0x0, @in6}}, 0x0) accept4$packet(r1, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000010c0)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000001200)) accept4$packet(r2, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001440)={{{@in=@loopback, @in6=@remote}}, {{@in6=@initdev}, 0x0, @in6=@local}}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f00000015c0)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000001680)) getsockname$packet(r0, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14) getpeername$packet(r1, &(0x7f0000001e00), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000003c0)=""/171) r3 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr, 0xfffffffffffffffe}, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) pipe(&(0x7f0000000180)) 00:23:59 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000004540), 0x0, 0x0, 0x0) pipe(&(0x7f0000000500)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fsync(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000480)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x2000000000100) r1 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x8001) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80000, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 00:24:00 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:00 executing program 2: timer_create(0x7, &(0x7f00000000c0)={0x0, 0x3f, 0x2, @thr={&(0x7f0000000200)="cbe8153005efa9d4ca63204892f1310498a25527fe7dec01b4c46eb564b1fc5266f3e7e360525d2de5996a3248ba4c612e60a9b0561b8d6d6ee2c8db2d5810298cc31fb8a7751151f4a076ecad3d884cb36bf450704082e0460f52c6b293601b96cf286bcd38ac4837eef8662fad298fe5f3966b25a89b133069d9ae8d605295a3f40b7f1ba5c39b3824650a235914", 0x0}}, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r1, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) getrusage(0x0, &(0x7f0000000440)) write$P9_RFLUSH(r0, &(0x7f0000000100)={0x7, 0x6d, 0x1}, 0x7) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000d80)={0x0, 0x0, 0x2, 0x6}) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0xfffffffffffffffc) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000140)) sendmmsg(r1, &(0x7f0000007e00), 0x26e, 0x0) sendmmsg(r1, &(0x7f000000ac80), 0x400000000000302, 0x4008800) [ 117.291433] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:00 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x2004000000006100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r1 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r0, 0x400, 0x0) sendfile(r0, r1, 0x0, 0x1000) 00:24:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x80) fchdir(r0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)=0x0) syz_open_procfs(r1, &(0x7f0000000300)='net/ip_tables_targets\x00') open(&(0x7f0000000000)='./bus\x00', 0x141043, 0x0) link(&(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='./file0\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="008287b1", @ANYRES16=r2, @ANYBLOB="020027bd7000fddbdf250e04000008001700020000001e56b6810a481c956fd0b51cb1f1ad1c81b42f035cbe36e6a8262d0ac6912a4d3604efbe3cf1aa45a44a08c334946d39fbea56a4e0f6d1eed7fd06142496e27fb470e2b6aaf331828a01923ab3064aeed2abfd25c016a2d8c7b44ac9f6d2b239cb00d62ad4a993a1ae759121be6c7448ff9b9a7453eefcba61627ca74503e7c2d95af2eabcb373"], 0x1c}}, 0x4000010) [ 117.435080] audit: type=1400 audit(1549499040.380:15): avc: denied { map } for pid=3003 comm="syz-executor2" path="socket:[9523]" dev="sockfs" ino=9523 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=udp_socket permissive=1 00:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x1ff, 0x400001) syz_open_pts(r1, 0x0) dup3(r0, r1, 0x80000) 00:24:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, &(0x7f0000548000)=0x5, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0xac14140d, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000580)=0xc) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r4, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x200000000, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x8, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x2, 0x8, 0x4, 0x5, 0x6, 0xee}, r6, 0x5, r5, 0x9) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x1000001fa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x7f) r7 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)="10ec", 0x2, r7) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000680)) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={0x2, 0xa, 0x0, 0xc, 0x2}, 0x10}}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) 00:24:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) wait4(r1, &(0x7f0000000080), 0x1000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0xffffffffffffffff) lsetxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 118.190430] audit: type=1400 audit(1549499041.150:16): avc: denied { sys_admin } for pid=3033 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:24:02 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) 00:24:02 executing program 3: open(&(0x7f0000000000)='./file1\x00', 0x10000, 0x100) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10) r0 = accept(0xffffffffffffff9c, &(0x7f0000000140)=@hci, &(0x7f00000000c0)=0x80) getsockopt$inet_int(r0, 0x0, 0x37, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {}]}]}}}}}}}, 0x0) 00:24:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x2, 0x3}, 0x10) 00:24:02 executing program 0: socket(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) write$P9_RREADDIR(r1, 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x3, 0x9, 0x6, 0x6, 0x0, 0xe92, 0x4000, 0x5, 0x0, 0x8000, 0x4, 0x4, 0x9, 0x100, 0x4533, 0x7e45, 0xa00000, 0x6, 0x0, 0x117d, 0x10001, 0x10000, 0x100, 0x100000000, 0x401, 0x81, 0x7fff, 0x80, 0xada, 0x3, 0x1, 0xffffffff7fffffff, 0xe4d4, 0x100000001, 0x7, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0xa763, 0x2}, 0x0, 0x7fffffff, 0x9, 0x7, 0x1ff, 0x9, 0x200}, r3, 0xb, r1, 0x0) sendfile(r1, r2, 0x0, 0x10000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000100)) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:24:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000140)=""/224, 0x48}, {&(0x7f0000000840)=""/132, 0xffffffffffffff90}, {&(0x7f0000000680)=""/169, 0xa9}, {&(0x7f0000000040)=""/82, 0x52}], 0x4, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)=0x0) syz_open_procfs(r3, &(0x7f00000007c0)='mountstats\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\xb4(-$\xde`\x97\x8c\xe6\xcd\x8d\x99\x03\xe5u\x97\x14\xb0\xd6\xd0\xae\xcf\xd9\x1e\x1f\xd00=#\xa3\xd4v\xd8\xbdj\x10(\xb6\xf7\x15\xe1\x88\xe7]\xca\xdc\x02\xdc\v\xbd@T\xea\xb7XmW\xffk\xc4\x96M|\xf1\x1f\xfa$\xf8IW\xc4J\xc6\xf0_\xc3\x86\x0f\xbd\x83V\x9ar\x02\xbf\xa0+\xe2.i\x7fP\xebnW\x90\x8d\xc5\xc7w\t\xeb\xd9\xec\xd8\x87WA\xee\x15O]\xafI\x03\x9b\x9f\"\x1c\vMdKm\x7f$\"cIB#\xe1Zt\xc7\xc7\x9f\xa0\xd3\x18\x1d\t\xee\x86\xe8\xda\xae\xeeo\xf8s6WK5:\a\xa5\x89\x9a8\xb4\'\xf7\a\xe6\xbe\"<\xd2IS\x04\xb4\xb4\xee\x80\a\x9d\x1b\x15\xfa\xadAB\xdf\x17l\'7\xf9[\xe17\xcb\xdcF\x87\xddW[#\xa5\x1cK&\x13\x1cF\x0e\xd5O\xf3\xd9\xc1\x0eYwk}\xbc \xe8\xd0l\xe1\xe2\x9a\x84') 00:24:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, &(0x7f0000548000)=0x5, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0xac14140d, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000580)=0xc) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r4, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x200000000, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x8, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x2, 0x8, 0x4, 0x5, 0x6, 0xee}, r6, 0x5, r5, 0x9) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x1000001fa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x7f) r7 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)="10ec", 0x2, r7) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000680)) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={0x2, 0xa, 0x0, 0xc, 0x2}, 0x10}}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) 00:24:02 executing program 3: r0 = timerfd_create(0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x100, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x100) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0xfd98) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000001740)={0xffffffff80000001, {{0xa, 0x4e20, 0xfff, @mcast1, 0x3}}}, 0x88) r3 = socket$netlink(0x10, 0x3, 0x0) pwritev(r2, &(0x7f00000016c0)=[{&(0x7f00000015c0)="c4eed396e5e3d0a4f8ab55f2047b7f2613774dcfc39aa72667dd933a7a66afb3871bbbd5bc01a9505448988723aebfbc752b923adcdcb56568e28de54568db09aaafe6769bd4adf571e290a5befe0be294d3c0616fa111d3d89a38a58e1f0be34786d2826b44d03b299a9c8826664d0eda37dcb8a6387164079306cabce7eb113f6bccd4f181753d723f7bf96c611f43e797d43c98617aca703269f6e4222dff73961846e922f3ea4412f00aebff589cc4ea9ad8971385bd41", 0xb9}], 0x1, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000004200050100000000000000000000000070b4e10719b13d2f34fe5c00643af2ab13f7ecde3d06a1f7387bad853cdc09e5f47ed5288f9c00a8406fa7c8f9c7d186bf7de85df16e2e2f20beef4e08257f977933d6cb275cdd24ce9d8a965875d4af3196c432b9f737604923813c716e8c8b97249324cf9f714ef92cd5126a44ea221c770a58e980fce7c725144e4bf98232379193b1852771771d61b72501955ca351ebc3194c750235b434ae9bd1b90a096159a37e3ad651ef455d7aa23553437ed47bf7e8d03bea5df53e3d7ae401081f984aa4f273a2945e4eaf7bbc8621bd781cbbd664ddca0ce1"], 0x14}}, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000100)='./file0\x00', 0x80, 0x20) write(r5, &(0x7f0000000100), 0xfffffdbc) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380), &(0x7f0000000540)=[&(0x7f0000000400)='$eth0keyringsystemproccpuset#+@nodev5-\x00', &(0x7f0000000440)='keyring\x00', &(0x7f0000000480), &(0x7f00000004c0)='/selinux/checkreqprot\x00', &(0x7f0000000500)='/({userlo\x00']) 00:24:02 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) rt_tgsigqueueinfo(r0, r1, 0x1d, &(0x7f0000000080)={0x1d, 0x5, 0x3f}) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000140)="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", 0xfc) 00:24:02 executing program 4: pipe(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) open(&(0x7f0000000240)='./bus\x00', 0x2, 0x94) 00:24:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffff2e, &(0x7f0000000080)={&(0x7f0000000000)={0x28, 0x15, 0x5, 0x0, 0x0, {0x1}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 119.485992] netlink: 176 bytes leftover after parsing attributes in process `syz-executor4'. [ 119.494942] PF_BRIDGE: RTM_DELNEIGH with unknown ifindex [ 119.502744] netlink: 176 bytes leftover after parsing attributes in process `syz-executor4'. [ 119.511866] PF_BRIDGE: RTM_DELNEIGH with unknown ifindex 00:24:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0af51f023c123f3188a070") mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000600)='squashfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x2) tkill(r1, 0x1f) wait4(0x0, 0x0, 0x0, 0x0) [ 119.577892] audit: type=1400 audit(1549499042.540:17): avc: denied { map } for pid=3079 comm="syz-executor4" path="/root/syzkaller-testdir264204644/syzkaller.N4fDlX/6/file0/bus" dev="ramfs" ino=8751 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ramfs_t:s0 tclass=file permissive=1 00:24:02 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0xc0000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f00000001c0)={{0x1, 0x1, 0x2000, 0x0, 0x7}, 0x53, 0x80000000}) r3 = getpid() fdatasync(r0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ptrace$peek(0x1, r3, &(0x7f0000000000)) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x8) 00:24:03 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) 00:24:03 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000940)=0xe8) getgroups(0x6, &(0x7f0000000980)=[0xee00, 0xee00, 0x0, 0xee01, 0x0, 0xee01]) lchown(&(0x7f0000000800)='./file0\x00', r0, r1) r2 = socket$packet(0x11, 0xa, 0x300) socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) write$P9_RGETATTR(r4, &(0x7f00000006c0)={0xa0, 0x19, 0x1, {0x80, {0xc, 0x4, 0x7fffffff}, 0x10, r5, r6, 0x3, 0x9, 0x6, 0xffffffffffff0001, 0xff, 0x3, 0x0, 0x9, 0x7fff, 0x400, 0x80000000, 0x0, 0x5e6, 0xc30}}, 0xa0) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x0, 0xc7, 0x0, 0x2, 0x5, 0x8]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r7 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r8, 0x400, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x33, @bearer=@udp='udp:syz1\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0xd4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000340), 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r7, 0x40485404, &(0x7f00000004c0)={{0x1, 0x3, 0x58, 0x2, 0x8}, 0xffff, 0x6}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{}]}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r7, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r9, 0x1, 0x10}, 0xc) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x9, @rand_addr="a070105530f76e9f6e391f35a6a83281", 0xff}, {0xa, 0x4e22, 0x7ffd, @empty}, 0x0, [0xfffffffffffffffe, 0x0, 0x7, 0x66, 0x0, 0x0, 0x6a9]}, 0x5c) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="81a0c2000000aaaaaaaaaabb8100000008004500001c000000120090780000000000000000000000000000000000"], 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000007c0)={0x3, &(0x7f0000000780)=[{0x101, 0x6, 0x5, 0x9}, {0x287, 0x4, 0x3ff, 0x7}, {0x7064, 0x6, 0xffffffffffff2dc2, 0x6}]}, 0x10) 00:24:03 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, &(0x7f0000548000)=0x5, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0xac14140d, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000580)=0xc) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r4, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x200000000, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x8, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x2, 0x8, 0x4, 0x5, 0x6, 0xee}, r6, 0x5, r5, 0x9) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x1000001fa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x7f) r7 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)="10ec", 0x2, r7) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000680)) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={0x2, 0xa, 0x0, 0xc, 0x2}, 0x10}}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) 00:24:03 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) fcntl$setstatus(r2, 0x4, 0x42000) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) setresuid(0x0, 0xee01, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 00:24:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) getuid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007e00), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r2, &(0x7f000000ac80), 0x66, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r2, 0x10001, &(0x7f0000000100)="cc56356274790dbabf8b60026976d84eafdc89bedf8c1000d8dd2a2ebbbda53bae1e772a1e5401e05b0ce18311fe0103d4e820aba85e64302f0d8c70f61110dc96e6ee7beb6ccd891069aa4e74c8b254c32167fa21941923b1b92045efc5f78a94d025246a38feea46718f1093136b78bcdefa39a3166cf924e2643813be90fb08187a026047c0f6983ff4ac8cfd59043f89046381e75c9fc63e07438ba4080ec75c7b86b7767d524cc61d71c2df249a289e") madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) setsockopt$inet6_tcp_buf(r1, 0x6, 0x3b, 0x0, 0x0) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfd, 0x80000}, 0xc) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) pipe(&(0x7f00000002c0)) chmod(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000600)='cpu&5!\"\x00\x00\x00\x06\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c\xe9\xe1\xa3\x87`_`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\xb6,\xd5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,K\t\x9a\x06\xef+rY,\xf8,Y$\x9at\xf4\x1a\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbeRuJT\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xaf\xa8$\x7f7V\xedLK4\xcf\x90@\xd5T\n\xca\xca\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xe31zwr\xe6o\x00\x04\x00\x00\x00\x00\x00\x00\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x00\x00\x00\x00\x00\x00\x00\xd5kc\x9f\xa4\xf8\xbbi=\x8dKe\x8a\x1d\xc1\x84FiQ$`\xbc\xed\xd9\xfc\xf4\x00\xda\xe1\xc6\xcb\xb5{\x87]\x9c\xc4\x99,VmR\xbc)a\xdbK/\\\x87V\xf4W\xbf\x96EO\xb0\xb3\xc78:\x95\xbf\x80\x95\x03]f\xcd\x97\xd6A\xa2\x8c\x8c\x8cx\xbe\x82\xc0q\x9e\x87\x88&\xf1\'\xc0\xb4\xd9\x8e\xbc!\xf5\xd6H\xce=\x87\xd7\x9f\xcd8Ru\b\xce\x05\x86\xb8\r\x98\x8d\xf8\xaf\xbcH\xf7\xc2k\xfd\xad9\xfc\aQ\x1c,pB\xd9|)QP\x8bW\x91\xb6\xf3\xe0|}[\x9fc\x8c\xc4\xd9x\x1e|\xaf\x86\x06Aa\xc6}E\xb0\x93o\xa2\xdf\xb8\xa7>a;\xd5\xd2-') 00:24:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) getuid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007e00), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r2, &(0x7f000000ac80), 0x66, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r2, 0x10001, &(0x7f0000000100)="cc56356274790dbabf8b60026976d84eafdc89bedf8c1000d8dd2a2ebbbda53bae1e772a1e5401e05b0ce18311fe0103d4e820aba85e64302f0d8c70f61110dc96e6ee7beb6ccd891069aa4e74c8b254c32167fa21941923b1b92045efc5f78a94d025246a38feea46718f1093136b78bcdefa39a3166cf924e2643813be90fb08187a026047c0f6983ff4ac8cfd59043f89046381e75c9fc63e07438ba4080ec75c7b86b7767d524cc61d71c2df249a289e") madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) setsockopt$inet6_tcp_buf(r1, 0x6, 0x3b, 0x0, 0x0) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfd, 0x80000}, 0xc) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) pipe(&(0x7f00000002c0)) chmod(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000600)='cpu&5!\"\x00\x00\x00\x06\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c\xe9\xe1\xa3\x87`_`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\xb6,\xd5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,K\t\x9a\x06\xef+rY,\xf8,Y$\x9at\xf4\x1a\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbeRuJT\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xaf\xa8$\x7f7V\xedLK4\xcf\x90@\xd5T\n\xca\xca\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xe31zwr\xe6o\x00\x04\x00\x00\x00\x00\x00\x00\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x00\x00\x00\x00\x00\x00\x00\xd5kc\x9f\xa4\xf8\xbbi=\x8dKe\x8a\x1d\xc1\x84FiQ$`\xbc\xed\xd9\xfc\xf4\x00\xda\xe1\xc6\xcb\xb5{\x87]\x9c\xc4\x99,VmR\xbc)a\xdbK/\\\x87V\xf4W\xbf\x96EO\xb0\xb3\xc78:\x95\xbf\x80\x95\x03]f\xcd\x97\xd6A\xa2\x8c\x8c\x8cx\xbe\x82\xc0q\x9e\x87\x88&\xf1\'\xc0\xb4\xd9\x8e\xbc!\xf5\xd6H\xce=\x87\xd7\x9f\xcd8Ru\b\xce\x05\x86\xb8\r\x98\x8d\xf8\xaf\xbcH\xf7\xc2k\xfd\xad9\xfc\aQ\x1c,pB\xd9|)QP\x8bW\x91\xb6\xf3\xe0|}[\x9fc\x8c\xc4\xd9x\x1e|\xaf\x86\x06Aa\xc6}E\xb0\x93o\xa2\xdf\xb8\xa7>a;\xd5\xd2-') 00:24:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xa3, 0x94) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2d2) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r2 = dup3(r1, r0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r2, &(0x7f0000000040)="a40ac34c119cced6a7d3ff513abf5718b1e10e2398949daa9700468bea285798566881d0cd3d145f00675ca0db8b286247078087c90b91ac30db67dd3e8eb87521f2ddae34ce6c4ad4b6de32bf1e706475d587ff4d0cc8e31bd1b185", &(0x7f0000000200)=""/156}, 0x18) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="db090000000000000002000002000000"], 0x10}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x331, 0x0) 00:24:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000000)) readv(r1, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/47, 0xfffffffffffffd51}, {&(0x7f0000000280)=""/158}], 0xfffffffffffffe5) 00:24:03 executing program 4: r0 = socket$inet(0x2, 0xb, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 00:24:03 executing program 3: clock_nanosleep(0x3, 0x100010000000000, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x8001, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x1e}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x376, &(0x7f0000000280)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x80002, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x20001, 0x0) gettid() writev(r2, &(0x7f00000023c0), 0x1000000000000252) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x1) ptrace$setopts(0x4206, 0x0, 0x2, 0x19) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000000c0)=""/130) r3 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) fstatfs(r3, &(0x7f0000000180)=""/87) clone(0x18000, 0x0, 0x0, &(0x7f0000000240), 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) fchmod(r0, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 00:24:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000499000)=""/35, &(0x7f0000000000)=0x23) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) 00:24:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = getpgid(0x0) getpriority(0x2, r1) llistxattr(&(0x7f0000000100)='./bus\x00', &(0x7f00000004c0)=""/4096, 0x1000) write$P9_RLERRORu(r0, &(0x7f00000000c0)={0x20, 0x7, 0x1, {{0x13, 'cpusetmime_type^em0'}, 0x8c2b}}, 0x20) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 00:24:04 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) 00:24:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) chroot(0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000000c0)={0x5, 0x7ff, 0x80, 0x6, 0x26}) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x4, 0x4) 00:24:04 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, &(0x7f0000548000)=0x5, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0xac14140d, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000580)=0xc) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r4, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x200000000, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x8, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x2, 0x8, 0x4, 0x5, 0x6, 0xee}, r6, 0x5, r5, 0x9) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x1000001fa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x7f) r7 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)="10ec", 0x2, r7) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000680)) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={0x2, 0xa, 0x0, 0xc, 0x2}, 0x10}}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) 00:24:04 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000940)=0xe8) getgroups(0x6, &(0x7f0000000980)=[0xee00, 0xee00, 0x0, 0xee01, 0x0, 0xee01]) lchown(&(0x7f0000000800)='./file0\x00', r0, r1) r2 = socket$packet(0x11, 0xa, 0x300) socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) write$P9_RGETATTR(r4, &(0x7f00000006c0)={0xa0, 0x19, 0x1, {0x80, {0xc, 0x4, 0x7fffffff}, 0x10, r5, r6, 0x3, 0x9, 0x6, 0xffffffffffff0001, 0xff, 0x3, 0x0, 0x9, 0x7fff, 0x400, 0x80000000, 0x0, 0x5e6, 0xc30}}, 0xa0) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x0, 0xc7, 0x0, 0x2, 0x5, 0x8]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r7 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r8, 0x400, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x33, @bearer=@udp='udp:syz1\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0xd4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000340), 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r7, 0x40485404, &(0x7f00000004c0)={{0x1, 0x3, 0x58, 0x2, 0x8}, 0xffff, 0x6}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{}]}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r7, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r9, 0x1, 0x10}, 0xc) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x9, @rand_addr="a070105530f76e9f6e391f35a6a83281", 0xff}, {0xa, 0x4e22, 0x7ffd, @empty}, 0x0, [0xfffffffffffffffe, 0x0, 0x7, 0x66, 0x0, 0x0, 0x6a9]}, 0x5c) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="81a0c2000000aaaaaaaaaabb8100000008004500001c000000120090780000000000000000000000000000000000"], 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000007c0)={0x3, &(0x7f0000000780)=[{0x101, 0x6, 0x5, 0x9}, {0x287, 0x4, 0x3ff, 0x7}, {0x7064, 0x6, 0xffffffffffff2dc2, 0x6}]}, 0x10) 00:24:04 executing program 0: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000200)) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x4}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000600)=0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x4, 0x200, 0xfff, 0x6, 0x0, 0x400, 0x8000, 0x4, 0x0, 0x7fe0000000000, 0x4, 0x3f, 0x77, 0xfffffffffffffff9, 0x40, 0x0, 0x7, 0x9b, 0x100000001, 0x1f, 0x3a0, 0x100000001, 0x0, 0x8, 0x18952000, 0x8000, 0x7, 0x4, 0x96b, 0x5, 0x6, 0x1, 0x1, 0x92f, 0x5, 0x3ff, 0x0, 0x65b, 0x1, @perf_bp={&(0x7f0000000540), 0x8}, 0x80, 0x7, 0x1ff, 0x7, 0x8001, 0x8, 0x7f7}, r1, 0x1, r0, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000340)={{0x1, 0x7, 0x9a0b54a, 0x39a0f9c3}, 'syz1\x00', 0x4}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@empty, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast2, @in=@empty}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, 0x0, 0xffffffffffffff03) getuid() ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e23, @remote}, {0x6, @remote}, 0x3, {0x2, 0x4e21, @multicast2}, 'syzkaller1\x00'}) setreuid(0x0, 0x0) 00:24:04 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0xa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x2, &(0x7f0000000000)=')\x00'}, 0x30) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x2, r2}) read(r1, &(0x7f0000000400)=""/4096, 0x1000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000100), 0xfffffdbc) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 00:24:05 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) [ 122.290329] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:05 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) 00:24:05 executing program 3: clone(0x24004400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x3, 0x4) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 00:24:05 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) open(&(0x7f0000000000)='./file0/file0\x00', 0x8500, 0x20) 00:24:05 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x400580, 0x0) write(r0, &(0x7f0000000300)="a35a2627217f31f31df433e785449e0e8db9bc809a4161bc9a1a4e01b7cbb4d7e693e6dd2ff77b4d9542c82398b58cb0129e17b0b352d44f283377703326450024e3649849301ee1b3844f8a79cae56905d1f70e8b7d4d2e96f8f0befd9eb16fd566b1c7de7aea837d7a65a428722bceb71a1db76306f0e41dbb82c8a72f1f4854b106390601a0ebbabddda463bf4c6f768cf1818bcf90264355bf1d0f1d4a912c172d670ea9463c3d008aa22f3490609d5978f02f70b6eac250851eb162b27a6ea6352ac1fd995c2548c9c1149763fb2ec0632ff2502aa2036be8ab945f2e5bcb0c9734f36b4d18a7f7e411e4b4750d759c12573dfe24cf2dadefe8c3d1395eb84b9acf566acf3f6f4e8a339017e0f24af531d23f6234f7a1bac455a93c80576578b0498f9388cea2dc61f7db198dde7fad8c47729ee6b8e04115a33efc52725f97393dad4d041463c9a3978152574f3e99ab861e5caa5e488fcea949e1ad5e9dfe5f113f16accdd1bb39d801ee6f3023c65d7790bbb94593570f849f9b8168b301d4f075599c1f2e01deaae3272b8da328263db916cd78c13307d38f9363a9e9528c9e813cab457347c94ada62d285dd7ac9d2b02d2b04ed834de0cc3cf61acfd24ce2e3ce23a765c94ecd508bc098b322d4ba81685ac2c6edc6224157338f64ab5c150468254ba46a8ccd229ea52ffd424653056c04157ad22c7fa9df787545cd4537ed222597d135b681034f385fb92004fb12f875dad114cc2b7060e1bd682b1ef58466d50e8f63b21e9ea979a0a70d0d0b7ea9cfe51d358ecc38148d3ecd6b04ba9335907d76a06513e3120fae9e04475ac2fcbd04d2e10b143e0794fbaa64c1cd065050c7527b7654ede8f03b175a7ff953a1d347e81fbdf0a4b5c655c409a38d6f0c094f885b7aa7392b4b9306cbb287424aa8c452a57211d129284f7107c1706dd7f780fd11bd819e74fc697ae060171cce6a413d6405c6e88bd2a7eb8e41a84d9ab0a87f52277553f80aae35ec8ab0e8d3b34162e791f5fd6fd3144aba5bdabb2154157fa39229e28ec7aa1b562de7e4948f69a063889bea6d2fd2472ba954fd4ba9421505745cb33a3f15cfbdbd74a7a40ce7e8575468e4b5c9a605ef4bc5f9ab559b239bd6e0c3d35b0f7dcb5a1046af09d87a770e467ecd0544ad3f420076ccc177dd01477280ae2102dbe0c342b9b705be2b658828e41d71c8f938d39dc5913c2c525c159c2b1ffadef0db3700303b47f18117d120916e4055b3c8a30f8ddb6f75234a179909319346025151162b55c4e9909dffb8a48c9eab2b40085fd5475f0c8df63df364297966e91c8ee0cc1835400fcbba07624cd39968d9f2a02ec89b3bfd763c06b557bcf56e4906d26406e044ff8ed6c711d460beaf09ddff0984f3e1424092751d28fd763d71f714f1899a1548877721bc4637b0fca8f4ae248fda02b06aad62febdf20d4d11fd5a82285096c562e54099aa540ee71c9fa143cb4b72b13725a4f3a44e7dc9daa9cc2e546d1b88e9be1738f663c0bbdae05e796bfbad42074431e424fc0286f393476d7be13c490a80f052f82466d02018b064de4fd7f3e2e68b771d7d2ae8fe33e5963a6c0e411e8785fd0ddc62090ed1bc670549d65533366fca0a0ee863c0d322b85cc18cabb2164fad977061b1070ce44cbcd33b89f6b1e3cbb33a3caf729acb5c924b31ed990b7cfbf82423cbaaea94301cdf88bc8620a7f05387eaf3e7d345410210845bbb66e0bb7cad81ff12d676de6d5668a0793610f25c67678962911f4ab2494687b452649f46786f7efee165ece809972705081696b9afb2905dc0107c8fd11867b53096edd064de9c8fb94bf433d0cfe8edd83939a3588afb71cc8875f60cae5a432d2214c7b8993725b565ee8269edbf1b13a0a5ffa07f16e8c1c5f308d49c10caa22f9e14f6442d3048909316bdf742be67342a910df3248e95c05471c6372e484bca4141c4831934c42d90ebd58fa917ff4b58591d5a2e631f176b71ddc34e637ab43dcf4fbc27a5c14aee79d39f8ef22497fdcf994b427449c59c517affa0121e95003c7b347482105f5d99bf9e8e0236369bf5d714ff02ab1acf780e61a08da7b11530a83bb397f66021b07833ce725470124fc2afd2502802cba257e7059f31da9c910792a792c26667aabed73cc4a8b78d18ad618c0cdeae7d21291963e10d6b626952178c83fdefd918cbcf8ea3bce6edaac5d328a2611e52d577cf5ebfb4e90d99620893d871d50d69d74fefecb94b4b113ef60a2f3aa6ee8998b174373cd0e6ddaf9d270a96e655cd0b8406be2da1ec912144552b8acbb9e4ac825928ff00de7fa0f510c42fd88b9fe3776f53ec3e6f90be8d5ec300f381fe075e78672f3841bb19d8340fc29883661f20ca93955ed83ad1d6afbbed2fc5d0b61ca90fe3768f21356a6c5a24aea4ec296ee2879d96b37d666432a867a79ac9a700bd168734447858e023d0bf131f194f6394d6fd71bc24180bfc86b9aebde23d23e5e5c2020783b074b6df3574bf9fdde1ddb682fc8dd6cdb605425d1ef9b3dbab714740a3afb23c790c76a10fca5daae59f8389fdbee95446ff60c83ff1e99d268af58478629b2bc4e5fe19408ca83d174994cfa7467500eb6a25f8bc8857af5e0341515991c381bcf5ec95268ff721c0b67d4dd289959040fae81b137527e5723a37541b71516fbdd30f767ffe89b3956f326138a337099c67dd4ca5ce984e3dba9c7600062829f6b21428ef75eaecc6798c07d537e13a30c0f6d5b6a0570330eb6dc33473cf7eff06f84c804582c7f8db11430e089d155af8021a791f6a2457b62d52ded777018098f6d6f8936f595018bc61e08d61d3864442e82a84fcdd9dc70e8b3a400ce040b1bdd0a8289082cb160a7cc0d1a1cff3e800a4d2c6399e7ef3fc4c8339090a423915a2bbb7b8516aaea87edc9887c73b7bb8907187d9be4b7346359f2d672507ddf5c1e9f0691d6c99df6697c7244afe150e01e4e3e38f43b77b6e6b384e08a87d2c8b6066462eec23acf9df713f250dc9d39a1348b91084a2c4e9b03bdcad1cc3f8d7f42c40f67416f71d42c537259760352ec95476591254241b6ed1063f9d75d9b35a0ea6e73d2a74e7c112441e3425ecba17790e9c61fdb55ceeb2e77f623b57dc2a84acdc09ee180fafc69513d32b91c30565f2042120da11228ea992261e28daa61903e193aba36cc26f95045f4399e957f79acdd2b747f4a29ca639079607da6b91a31da8305d6d637412e290fc9eec9678dfad2cdafa810ce2070c3c4e0dae48beefa881069192ff01a06e3deba1bc3c845eb90f8036dcc254f168ea0c3accaf8bd63c532170b7f1c34672218e97a47ecc2d8d03515ce16e1b789801dd4a82c084c1c56dfa3978fc4206050deadb4b851342f2a033634fa991aeb832836be26570f39eb0082bc1a79a9022ac7d8c38c8deca67816a9a6f7fddf1fc0a967a75ba71918ea3a624cb61e3d2f1aac26d953bb1bd04eb7f7bcd798593011321bb134a0e9ace53df4b88e58442287a4a566b52516a1e1740423380013652e7e2a210c18f188774538212b5599745fa036bcda83e67409c2f22a372ea988bb7736c895f42e461475ebf1c2c84d7d7fafe6bbd7bc294d40816f491e033f311e988481f32183fd7893d1e088aa9f861043e6886ceb2e3475fae596f6a7702200733c19a4fabddafd2cbe11769242877ac2cf46550ac68730461adabf8fda48623df5f3fcd0f4ef9a30dce1cb310ea6b8102821d49fa233fb86946bcb1064c483e228c96033e65aca048b240e83058ea34eb14dc693e2e3e11f63ecbef0ebf9700a23e752831fb360160d13237a428f01218975e599e01d5451e149004afec7a6fd64ecefb81e0a92897785a3fb8aaa0cbe7bbce5b041f1f7117c8fbc4c2315feb73214b989247df340e5d85f9b826cdb31d116b6538e92bdc986ef1e4bb9935bad3b6c5dc4e25a46b1117e3b6b709cdb1a42e83026ede455efdbbaecf1403391252db9641279f9dc22125a3577547c63d7a4c4e84241d60f8634e4096333c1e7f2c180fa0d19476f3021b1bde007b6164a11d1992ea79b06719c083b3105d300eb3075ff7f4c911a461cf11200ae03483c2ccf5b7acbd7ad49e8fdafeba1c26ba8fb0cadc38a2a44649fc46bd51748934dfdfc81b62f7742cd7257595d99843f66fb7c4673f7b816082ae2f8e3581e0259746bd4155bffe885d423f4db03c29cd5d9b58e31a636ecf7e9611d20ab4f9654a22d3e13e7380dd8be721eced71dd2436ca213e4ea2d0279cd86f9554e4dedc77abea2962f9c949cf7edd62ebb431642d93cbdcf6c68cd10064d0d5b6ac43f72868f17699531124e7de906849b91dee6cb779929d3d3124aa85a032123c7d8468bd2de7ac45b6de0555a6a58dc82ea9df8b0dde9dab91b37a7603992e783621eafac14e071231a615a68d05778c33d5d02b7d5b764bc10e2636ed088ae7582e7a7182228bc8d22798f3b044131cc9bdcbe1fe0df68346b7f2a61984f61b206422167f7dbf8001529fb966bdbf727cbdf57a2e74f911ca400dee8f9abd51446febd50870d0b37fe30d2da72d33bca5c085d714cc904f630c577af550371cbe2c507ae45206591bd8163b47171f53f31bf1e1251147ea14c990cccf5145d8a5c83913335f6d8cb4c76567c77e55ece5801bedd31c2598fa291b01b6818adbc749fc8cec69ddcc0baae6906880c1311c1a45f6647356437ba89c421d4813ea8504aa3a137db2bcae48eca64963647128f0a5b455c02f8b7ac43c8a4f5ecb5b7c4cba4af046c7c8882a226b5bbf32643309d8b0d61074ac7d42bdf95c450f453dd703542dec3abbaabec9d405010cc4f9aa0a10b3a9c1298bf34d3c4b268bda5944091a65222b577ca905333d4cc0159a4d7d32b650123674036dba98673921d61edb0e0c19eea978e30091a29ff7ed60f8764accfc3ae158e0b31e4db10e673f678c7a8ec0890a23019b3179af6c5ed64ddc1b561df4aaa065d45cf9998ca887d3fbbafc8809bc16ecee0661a9ea88ce1580fd7b73daefed367695f6fcff36127cc6d82f29db2321586b5b4e66beb4a924e5547006cd4c9b8a40f7627334ba96663c19d8a2e7d721078fbe2e0bbaf10fbbcecb79622082e34b215c3c9e47424ea09c90ddb8baf8d5494319ec3a13fdc0aadf8626e70c539a888ff240126c765b5b72ca27706385d064214e62a6ff2c34aa8f7ce6ca2a6be054446a07173d8a48626737f85fef78089049f3e1d9efba8438cf17f803cebd0bf72009cc6cc5f63785483e80bd6244dd89aafbc010f36cf6a749596a8264afb89f1aed992c87501cda6af96d57c50d09f0d4636360ced7250b488a888544d0c116a8b4b670ca8dc3f9635b98159ef6fc3f1f3b1ab90b09667d4d2a2ef599d3fc24da7da01efb2ff8b9ea886e4b275ad3fa641dc32ab9a4f69754dba5bf783e3078d261ab86837ce0f99ec9a67660e924b1c5880f81c728d68848622a208dfca0b1d35f1073e360ba48cf022be7efd44949b3e8da918a2cc26a8d6fac0351b522f04bf99b7715da46bc37cbef04b317fd8019f87202438890a152d63e7db4df2d6da63f9775908431dee5a2f99887d8b4cdfa8dcd6b89657bee16bdf827ea693d441a9852ad356c063e82bf5dbfcb57e72d637bc8ffd0f8000f351e4ff46adf879b830641cf553144fafb7645a43e0e6d81741fefa5f081fa26eb1da22f815000572d1f8aee3b281c2e25aeadb3ddc07ac749e501768565da40", 0x1000) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) 00:24:05 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000940)=0xe8) getgroups(0x6, &(0x7f0000000980)=[0xee00, 0xee00, 0x0, 0xee01, 0x0, 0xee01]) lchown(&(0x7f0000000800)='./file0\x00', r0, r1) r2 = socket$packet(0x11, 0xa, 0x300) socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) write$P9_RGETATTR(r4, &(0x7f00000006c0)={0xa0, 0x19, 0x1, {0x80, {0xc, 0x4, 0x7fffffff}, 0x10, r5, r6, 0x3, 0x9, 0x6, 0xffffffffffff0001, 0xff, 0x3, 0x0, 0x9, 0x7fff, 0x400, 0x80000000, 0x0, 0x5e6, 0xc30}}, 0xa0) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x0, 0xc7, 0x0, 0x2, 0x5, 0x8]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r7 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r8, 0x400, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x33, @bearer=@udp='udp:syz1\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0xd4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000340), 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r7, 0x40485404, &(0x7f00000004c0)={{0x1, 0x3, 0x58, 0x2, 0x8}, 0xffff, 0x6}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{}]}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r7, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r9, 0x1, 0x10}, 0xc) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x9, @rand_addr="a070105530f76e9f6e391f35a6a83281", 0xff}, {0xa, 0x4e22, 0x7ffd, @empty}, 0x0, [0xfffffffffffffffe, 0x0, 0x7, 0x66, 0x0, 0x0, 0x6a9]}, 0x5c) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="81a0c2000000aaaaaaaaaabb8100000008004500001c000000120090780000000000000000000000000000000000"], 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000007c0)={0x3, &(0x7f0000000780)=[{0x101, 0x6, 0x5, 0x9}, {0x287, 0x4, 0x3ff, 0x7}, {0x7064, 0x6, 0xffffffffffff2dc2, 0x6}]}, 0x10) 00:24:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x80000) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfd) clone(0x2000000001041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) waitid(0x0, 0x0, 0x0, 0x80000002, 0x0) 00:24:05 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x489) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) fremovexattr(r0, &(0x7f0000000140)=@known='security.apparmor\x00') bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r2, &(0x7f0000008a80)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}], 0x400025d, 0x0) r4 = dup(r2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f00000000c0)=r5) 00:24:05 executing program 0: io_setup(0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffff9c, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) tkill(r0, 0x11) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x9) wait4(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000005000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0xc) syz_execute_func(&(0x7f00000001c0)="c422bdab6000c4837d09c3dd3ef3a5d9f9c4c1e572e4fff30f51b10e000000d14e06660f383c2bc4a24dba74ae09c4e23d3f94570b000000") getpriority(0x2, r2) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) write$eventfd(r3, &(0x7f00000000c0)=0xc8f5, 0x8) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 00:24:06 executing program 0: io_setup(0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffff9c, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) tkill(r0, 0x11) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x9) wait4(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000005000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0xc) syz_execute_func(&(0x7f00000001c0)="c422bdab6000c4837d09c3dd3ef3a5d9f9c4c1e572e4fff30f51b10e000000d14e06660f383c2bc4a24dba74ae09c4e23d3f94570b000000") getpriority(0x2, r2) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) write$eventfd(r3, &(0x7f00000000c0)=0xc8f5, 0x8) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 00:24:06 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) memfd_create(&(0x7f0000000300)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x8000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) epoll_wait(r0, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x80100, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:netlabel_mgmt_exec_t:s0-\xdf\x7f\xd5S\x80T\x8ah]\xa3\xa5\x9f\x9a\xba\x85\xa9\xfbK\xdf\xdc\x12<\x893\xf8\xf2\x89\xa7\xe9\xa3\xf1\xa6f\xd0\xd5\x05\xa5Tw\x13Z\xb0x\x87\x89\f\x83\x8b\xfa\xfc)\x06\xc8\xf4 i\xb2\xb3\x97\x03\x82\x9c\x9a\xd3?\xa5e5\x93 \xf2\xfc[\xfdt\xfc\x84\xd2\xad\xf5\x9d\xe9\xbc\xc0\x97\xf5r\xb5\xcf\x91\x03^\x99y\f}\x8a6\xd8P\x84?\xe0\x9f\xdf\xf3\xdfE\xbb\xe6\xee01#x\xce\xba\"\xf7\x13\xdcG\v\xab7\xb4\x0e\xf6\xa0\xcd\xa7\x99\x90pY\t\v\xb3\x86>\x97Z\xd70mW\xf6l', 0xbe, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r2, &(0x7f00000003c0)=""/72, 0x41d) 00:24:06 executing program 2: syz_emit_ethernet(0x10fae8fb61aeaacf, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [{}], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @link_local, "", @local, "55a69401a5dec5a7eb6dda4170864714"}}}}, 0x0) [ 123.222821] audit: type=1400 audit(1549499046.180:18): avc: denied { mac_admin } for pid=3263 comm="syz-executor0" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 123.248702] SELinux: Context system_u:object_r:netlabel_mgmt_exec_t:s0-ßÕS€TŠh]£¥Ÿšº…©ûKßÜ<‰3øò‰§é£ñ¦fÐÕ¥TwZ°x‡‰ ƒ‹úü)Èô i²³—‚œšÓ?¥e5“ òü[ýtü„Ò­õé¼À—õrµÏ‘^™y }Š6ØP„?àŸßóßE»æî01#xκ"÷ÜG «7´ö Í§™pY ³†>—Z×0mWöl is not valid (left unmapped). 00:24:06 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) 00:24:06 executing program 2: prctl$PR_SET_UNALIGN(0x6, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x2}]}, &(0x7f0000000000)='G\xfbr\xc0E\xf1,a\asa\xb4~\x1c\xf28', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 00:24:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) 00:24:06 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = getpgrp(r2) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) fsync(r1) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000240)={0x7, 0x5}) ptrace$setregset(0x4205, r3, 0x201, &(0x7f0000000600)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$int_in(r0, 0x5452, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) io_setup(0x5, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) io_cancel(0x0, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7e, 0x4) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) sendfile(r6, r7, &(0x7f0000d83ff8), 0x8000fffffffe) 00:24:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) memfd_create(&(0x7f0000000300)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x8000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) epoll_wait(r0, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x80100, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:netlabel_mgmt_exec_t:s0-\xdf\x7f\xd5S\x80T\x8ah]\xa3\xa5\x9f\x9a\xba\x85\xa9\xfbK\xdf\xdc\x12<\x893\xf8\xf2\x89\xa7\xe9\xa3\xf1\xa6f\xd0\xd5\x05\xa5Tw\x13Z\xb0x\x87\x89\f\x83\x8b\xfa\xfc)\x06\xc8\xf4 i\xb2\xb3\x97\x03\x82\x9c\x9a\xd3?\xa5e5\x93 \xf2\xfc[\xfdt\xfc\x84\xd2\xad\xf5\x9d\xe9\xbc\xc0\x97\xf5r\xb5\xcf\x91\x03^\x99y\f}\x8a6\xd8P\x84?\xe0\x9f\xdf\xf3\xdfE\xbb\xe6\xee01#x\xce\xba\"\xf7\x13\xdcG\v\xab7\xb4\x0e\xf6\xa0\xcd\xa7\x99\x90pY\t\v\xb3\x86>\x97Z\xd70mW\xf6l', 0xbe, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r2, &(0x7f00000003c0)=""/72, 0x41d) [ 123.427106] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 123.473516] audit: type=1400 audit(1549499046.440:19): avc: denied { prog_load } for pid=3285 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:24:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x200000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x3, 0x0) getsockname$unix(r2, &(0x7f0000000380), &(0x7f0000000080)=0x6e) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in=@multicast1}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) geteuid() geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@loopback, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, 0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) fstat(r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:24:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9dd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-'}, 0x28, 0x2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x1, 0x8000, 0x20}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r2, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 00:24:06 executing program 0: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r1, &(0x7f0000000340)="e0f8b299faeca1e214b0936995616afbd3252ac2d0749ff2727d27b61062021637cd43358cccd414247c4f6dcf52e7dd1ec0788519b2144d771e930adc70b761649ab53987dfd7797e54381b50df4206383104cf4b0a4f7e2ccd3e337e7ad829b7aa88be694e978326e7ef0dc461dcc8d3cc6597321a991f6e86dcb4444e16405a33736220236b3cb52ee17bd4774dbda784998a144227e781b4645d6f3fe3e540104acbd9790d65fd5d80ab1dcf257b8e6f16bf198f80a0953aec698994fab4c60aeea13b8addfeef2dad5ca83a4d462f113e4a3481e316a6bedc0339c2d41b2a898e6a7739a395", &(0x7f0000000440)=""/82}, 0x18) r2 = epoll_create(0x8) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000180)) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffff9c) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000000c0)={0x83dd, {{0xa, 0x4e23, 0x95, @loopback, 0xfffffffffffffffb}}}, 0x88) r4 = epoll_create1(0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000200)='veth0\x00') setsockopt$inet6_tcp_buf(r0, 0x6, 0x2d, &(0x7f0000000080)="8e91626a25c65b007352e630a92c13e2a9fd3957430b83908d47dbca", 0x1c) epoll_create(0x6) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000006c0)=ANY=[@ANYBLOB="7261770026000000000000000000000000c24ff86a0c4cae8ca5cb2ec3588800000000000000000000000000000004000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000df00000000000000000000000000000000000000d99ac893451ea434759452dd3d069dcec155435e50889cc59870e523db3a9bd1b65c213300cc3e03084b3c2118ce342be846d02f77cff0b374fb699e24013c652d5f30c3ad5b84815f09644024f4200f7d3bc25dc253fd0d499c9a816d25d8e6ae75f2a0"], 0x68) fcntl$lock(r4, 0x7, &(0x7f0000000040)={0x1}) fcntl$lock(r4, 0x26, &(0x7f0000000240)={0x3, 0x1}) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f00000001c0)) 00:24:06 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 123.767470] audit: type=1400 audit(1549499046.730:20): avc: denied { map } for pid=3315 comm="syz-executor0" path="socket:[9974]" dev="sockfs" ino=9974 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:24:07 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:07 executing program 2: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000580)=""/120, &(0x7f0000000540)=0x78) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffd24, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000001000010500000000000000000000000028f4a26468aa8e8cdcefcd0d7b9a3165279a90dbf893176b63da647f0538ad9b6d073ffafdb48671d7b4836b5abc2a7bfba70605548860baacb52ba61c036e9f503bd3c88915a75ac4abc09551cfba44f669da7c92a17399db7fed9a62da5582e9e43cf3c9781b960fb864bb533c36aa6f2595521542838066fad32e080b78e89379f40448873e9e6bfa29e51a", @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100736974000c0002000800030000000000"], 0x38}}, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000440)='yeah\x00', 0x5) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r2, 0x40c, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x20, 0x200, @udp='udp:syz0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480)=0x47f, 0x4) seccomp(0x0, 0x1, &(0x7f00000007c0)={0x8, &(0x7f0000000780)=[{0x5c35, 0xbde, 0x401, 0x8}, {0x2, 0xffffffff, 0x8, 0xbe0}, {0x1, 0xd316, 0x7, 0x400}, {0x3f, 0x2, 0x6b, 0x3}, {0x6, 0x3, 0x800, 0x401}, {0x2, 0x37, 0x9, 0x5}, {0x100000000, 0x3, 0x2, 0x7f}, {0x2, 0x100000001, 0x100000001, 0x81}]}) r3 = gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000600)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r3, r4, r5}, 0xc) getsockname(r1, &(0x7f0000000380)=@l2, &(0x7f0000000400)=0x80) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000340)=0x8) 00:24:07 executing program 0: mlockall(0x7) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) munlockall() [ 124.065480] netlink: 24 bytes leftover after parsing attributes in process `syz-executor2'. [ 124.136861] netlink: 24 bytes leftover after parsing attributes in process `syz-executor2'. [ 124.217227] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:07 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') sendfile(r0, r1, 0x0, 0x9168) 00:24:07 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xa7, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1ffc}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x400100) 00:24:07 executing program 0: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) tee(r0, r1, 0x401, 0x4) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000100)=0x1) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000080)) r3 = socket(0x400000000010, 0xa, 0x3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000040)=""/59) socket(0x0, 0x4, 0x101) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000000)={0x1, 0x70, 0xa3, 0x7ff, 0x18, 0x1, 0x1f, 0xffff, 0x100000001, 0x3, 0x40, 0x3}) setresuid(0x0, r4, 0x0) setresgid(0x0, 0x0, r5) 00:24:07 executing program 5: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="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", 0xfc) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x101c00, 0x0) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="647f900d5246f4950f08013aa09e563d4d9454c93c565755793664813222242168d811fafd2f11a9c102dee51ae535564a3a0ccb9df0f61724fe76a9e8c7cdf4d5111a1527ba2b4a4b011da5dd6c930ac5adb2df00990d631597ce12edf690842a1ee64e691a16891a32969bb39cc89d813f9d00a1e1ee9bf2476b6130ce92a36dcefbade879a5e0", 0x88}, {&(0x7f00000001c0)="e8a6e651fcb944b0a38cc91258bd3b21104c75168f5117078d6f4faaa4aed33da7b0107ab7abec4d60cb7441a327661005a243c8564c9b45b9157214ad6f8f77b9dfb4cf0899b12889644cea74151514c913e0bf14d84edadfdae267f97c53e394429e26e4991ca755f85b606056c412a094e7cc96f0d0c48c395167dd7b92fae71a62b6ee97a1d469918de698ac775804bbdcbbf4065928a283264df656b2e710f05c2c9bce020c13a86ab4516dcb1d3e81390dcf81e9a235d77059d4ead0d3dcc0b04613ade345c6ab4c9091120af454e97310ad758923e4d52ae9b013655ddab714e1f4ca1a", 0xe7}], 0x2, 0x8) 00:24:07 executing program 5: r0 = socket$inet(0x2, 0x807, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22}, 0xffffff9b) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0) [ 124.512467] netlink: 176 bytes leftover after parsing attributes in process `syz-executor5'. [ 124.542997] netlink: 176 bytes leftover after parsing attributes in process `syz-executor5'. 00:24:07 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) prctl$PR_SET_FPEXC(0xc, 0x10000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000080)) 00:24:07 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x400000) unshare(0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x3) r5 = getpid() mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getpeername$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000280)=0x1c) r6 = memfd_create(0x0, 0x2) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) flock(r6, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000140)) fcntl$setstatus(r1, 0x4, 0x6800) write(r1, &(0x7f0000000040)="8931be086d8eff0a48eef3d08c870aeb17f0d613ed13a3974a3c0dc23add1f41d21e5cf874fefc26c5e52ae0345f71912682a460ae6493701b4df1ead3", 0x3d) accept4$inet(r2, &(0x7f0000000a00)={0x2, 0x0, @initdev}, &(0x7f0000000f00)=0x10, 0x800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001140)=0xe8) fstat(r6, &(0x7f0000001180)) getuid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000004d40)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@local}}, &(0x7f0000004e40)=0xe8) stat(&(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)) fstat(r0, &(0x7f0000004f40)) getegid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004fc0)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, 0x0) getgroups(0x3, &(0x7f0000005100)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000005140)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000005240)=0xe8) lstat(&(0x7f0000005280)='./file0/file0\x00', &(0x7f00000052c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000054c0)={{{@in6, @in6=@initdev}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f00000055c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005600), &(0x7f0000005640)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000005680)={{{@in6=@remote, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005780)=0xe8) getresgid(&(0x7f00000057c0), &(0x7f0000005800), &(0x7f0000005840)=0x0) sendmmsg$unix(r2, &(0x7f0000005940)=[{&(0x7f0000001380)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001500)=[{&(0x7f0000001400)="a26f8bfb55086884314a9767a4fe5fdee9fb56cd9bc172c13bc6f99b9357027cd9edec5893fcc2108c58267bca510d66a34b78ee1f244b2fb58e8bc7d64a756184448c4a0611ca47e58b030596926c3e9a9c8db05a5d68f5e31d1436738c831b0a072c8195fb24345b02176289da947e84513c4e7aa16ca536a74c908f28c49e09030fb403cc00939d50a2f5049a860c6a7801be2331c9d7c4d775ae2f1e26ebbdc81ea38752a06fdfc7a579a33ffa26fa59ac1c5d3674366047a9f955596e9ed03831d8a7eafa1b1c74991ddd6100489a7bd1318f3b3bbb256d994c", 0xdc}], 0x1, 0x0, 0x0, 0x4008800}, {0x0, 0x0, &(0x7f0000005480), 0x0, &(0x7f0000005880)=[@rights={0x20, 0x1, 0x1, [r3, 0xffffffffffffffff, r0, r1]}, @cred={0x20, 0x1, 0x2, r5, 0x0, r7}], 0x40}], 0x2, 0x40004) [ 124.636389] FAT-fs (loop2): Unrecognized mount option "codepage=4³7" or missing value 00:24:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000100)=0x9, 0x2ff) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x29}}, 0xa646b0d49f93cd94) recvmmsg(r0, &(0x7f0000000000), 0x40000ad, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 124.729369] audit: type=1400 audit(1549499047.690:21): avc: denied { associate } for pid=3376 comm="syz-executor4" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 00:24:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x9, 0x0, 0x0) 00:24:07 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:08 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x400000) unshare(0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x3) r5 = getpid() mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getpeername$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000280)=0x1c) r6 = memfd_create(0x0, 0x2) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) flock(r6, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000140)) fcntl$setstatus(r1, 0x4, 0x6800) write(r1, &(0x7f0000000040)="8931be086d8eff0a48eef3d08c870aeb17f0d613ed13a3974a3c0dc23add1f41d21e5cf874fefc26c5e52ae0345f71912682a460ae6493701b4df1ead3", 0x3d) accept4$inet(r2, &(0x7f0000000a00)={0x2, 0x0, @initdev}, &(0x7f0000000f00)=0x10, 0x800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001140)=0xe8) fstat(r6, &(0x7f0000001180)) getuid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000004d40)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@local}}, &(0x7f0000004e40)=0xe8) stat(&(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)) fstat(r0, &(0x7f0000004f40)) getegid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004fc0)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, 0x0) getgroups(0x3, &(0x7f0000005100)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000005140)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000005240)=0xe8) lstat(&(0x7f0000005280)='./file0/file0\x00', &(0x7f00000052c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000054c0)={{{@in6, @in6=@initdev}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f00000055c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005600), &(0x7f0000005640)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000005680)={{{@in6=@remote, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005780)=0xe8) getresgid(&(0x7f00000057c0), &(0x7f0000005800), &(0x7f0000005840)=0x0) sendmmsg$unix(r2, &(0x7f0000005940)=[{&(0x7f0000001380)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001500)=[{&(0x7f0000001400)="a26f8bfb55086884314a9767a4fe5fdee9fb56cd9bc172c13bc6f99b9357027cd9edec5893fcc2108c58267bca510d66a34b78ee1f244b2fb58e8bc7d64a756184448c4a0611ca47e58b030596926c3e9a9c8db05a5d68f5e31d1436738c831b0a072c8195fb24345b02176289da947e84513c4e7aa16ca536a74c908f28c49e09030fb403cc00939d50a2f5049a860c6a7801be2331c9d7c4d775ae2f1e26ebbdc81ea38752a06fdfc7a579a33ffa26fa59ac1c5d3674366047a9f955596e9ed03831d8a7eafa1b1c74991ddd6100489a7bd1318f3b3bbb256d994c", 0xdc}], 0x1, 0x0, 0x0, 0x4008800}, {0x0, 0x0, &(0x7f0000005480), 0x0, &(0x7f0000005880)=[@rights={0x20, 0x1, 0x1, [r3, 0xffffffffffffffff, r0, r1]}, @cred={0x20, 0x1, 0x2, r5, 0x0, r7}], 0x40}], 0x2, 0x40004) [ 124.989248] audit: type=1400 audit(1549499047.950:22): avc: denied { syslog } for pid=3392 comm="syz-executor5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:24:08 executing program 5: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x3c5) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) pipe2$9p(&(0x7f0000000000), 0x84000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/context\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000005c0)="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") write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x151) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000500)=0x10001) [ 125.149503] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 125.153534] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 125.215583] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 125.269892] attempt to access beyond end of device [ 125.288819] loop5: rw=12288, want=8200, limit=20 [ 125.310478] attempt to access beyond end of device [ 125.319801] loop5: rw=12288, want=12296, limit=20 [ 125.325226] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 00:24:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="080000002000010000000000000000000a20000000000000000000000400800014000200fe8000000000000000000000000000bb14000100ff010000000000000000000000000001"], 0x1}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x10, 0x0, 0x5}}, 0x14) 00:24:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81, &(0x7f00000001c0)="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") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x3, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) sendmmsg(r1, &(0x7f000000ac80), 0x66, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0x9c, 0x1b, 0x1, 0xffffffffffffff9c}) ioctl(r0, 0x33, &(0x7f00000000c0)="21ff07f7f9dac94d06bd1ff362c4dcd09b2deced934b8eb850231759b071800c3974058a9e0b6ff21223789a1c8a6ec31fd9be966bde8b31074e94f716ad695abf0e6e515326341add46b33befe2429a2fd104ec56c65ea085ecfa5459429b8dbdcc298e7cc0dd2dd3c6f668b5eaa51e1c71efbdf7a5ec66") ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x7) [ 125.352524] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 125.390532] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 00:24:08 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{0x77359400}, {0x77359400}}) keyctl$setperm(0x5, r0, 0x1000002192c07) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x2, &(0x7f00000001c0)=[r1, 0x0]) keyctl$chown(0x3, r0, 0x0, 0x0) 00:24:08 executing program 2: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) poll(&(0x7f0000000080)=[{r0, 0x42c0}], 0x1, 0x1) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000100)={0x15, 0xffffffffffffff33, 0x0}) r2 = fcntl$dupfd(r1, 0x406, r1) write$P9_RVERSION(r2, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0xfffffffffffffeff, 0x8, '9P2000.u'}, 0x15) [ 125.409535] attempt to access beyond end of device [ 125.425406] loop5: rw=12288, want=8200, limit=20 [ 125.442876] attempt to access beyond end of device [ 125.452574] loop5: rw=12288, want=12296, limit=20 00:24:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) fcntl$setsig(r0, 0xa, 0x11) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000001b000000050000004cc57c7be9fa322474d8031f001803000018030000cc000000ac0100000000000010040000100400001004000010f968b3bfa9c46a341e88"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 125.465964] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 00:24:08 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x2001005, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x28000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, 0x0) r0 = inotify_init1(0x80000) fcntl$setsig(r0, 0xa, 0x8) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 00:24:08 executing program 2: clone(0x13102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x141, r0}) [ 125.576592] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 00:24:08 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0xffe, &(0x7f0000005cc0)=0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x80000001, 0x0, "0ec0c552098ec4fbc92c4f5b8ad7622e24b9c9ad53249360eef25e56c754915d3b1738215ea3691d9e675ba7a020677d191fd630cfebc30d468b106e1f6daf1c4639db2d32203a10662c476d8d995396"}, 0xd8) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000280)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x7fffffff, 0x0, 0x80000000, 0x0, 0x0, 0x29c4, 0x10000, 0x2, 0xffffffff, 0x1, 0x8, 0x89, 0x19, 0x8, 0x80000001, 0x1, 0x80000001, 0xffffffffffffffe0, 0xf1b, 0xfffffffffffff801, 0x401, 0x6, 0x0, 0xf2, 0x3, 0x3e3, 0x6, 0x9, 0x6, 0x1, 0x8, 0x7, 0x5, 0x5, 0x10001, 0x50, 0x0, 0x3ff, 0x2, @perf_config_ext={0x4099, 0x5}, 0x100, 0x5, 0x5, 0xd, 0x1, 0x7537, 0x7}, r0, 0xf, 0xffffffffffffffff, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x10000000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) write$P9_RSTATu(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', r4}) syz_emit_ethernet(0x1, &(0x7f00000055c0)=ANY=[@ANYBLOB="aaaaaa6421f7aaaaaaffffffffffff86dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607159378d33e1db1c73936c77aa3a6f7fac33b042bd368236862531934ecb1c373d6ea51369e92f4fbd6cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712d5604c0aa955c9b1253a13782ae85adb198b685351a9792b384d4b22d4cd072919de21346d49b1da6c20ffd2961a97"], 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 00:24:08 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/221) syz_emit_ethernet(0x0, &(0x7f0000000280)=ANY=[], 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f0000000180)={0x360, r1, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffec3549bc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_LINK={0xc4, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x86}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1, @empty, 0xfffffffffffffc01}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_team\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x80000001, @dev={0xfe, 0x80, [], 0x26}, 0x100}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffff44}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffff}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xcd}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8a}]}]}, 0x360}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 125.626243] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 125.646160] attempt to access beyond end of device [ 125.664694] loop5: rw=12288, want=8200, limit=20 [ 125.678602] attempt to access beyond end of device [ 125.697199] loop5: rw=12288, want=12296, limit=20 [ 125.710844] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 125.725788] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 125.757675] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 125.776812] attempt to access beyond end of device [ 125.787508] loop5: rw=12288, want=8200, limit=20 [ 125.798291] attempt to access beyond end of device 00:24:08 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3, &(0x7f0000000080)='*%\x00'}, 0x30) waitid(0x3, r1, &(0x7f0000000280), 0x80000000, &(0x7f0000000300)) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)=0x5) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r2, 0x8003f1) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="0001000000000000ffff00000000000000000000005e2d3886c627ef0d970a3383e228e18ddb4daf9e1c91d77e325d40ceb42460af7db7903a7ec7a3301357f7e8d387d56cd8ecdc1b8242a4bf52357338152589636522e218324e1b323d2552d83aaea241564bcc56fb4dc6a5d3d65d92ba8fffa68f91"]) sendmsg(r3, &(0x7f0000000740)={&(0x7f0000000200)=@sco={0x1f, {0x54ea, 0x5, 0xfffffffffffffffd, 0x401, 0x2}}, 0x80, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 125.804021] loop5: rw=12288, want=12296, limit=20 [ 125.808989] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 00:24:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x1}, {0xe5, 0x10000}]}, 0x14, 0x3) r0 = accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_nanosleep(0x7, 0x0, &(0x7f0000000300)={r2, r3+10000000}, &(0x7f0000000340)) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000100)=""/6) getdents64(r1, &(0x7f0000002300)=""/4096, 0x1000) 00:24:08 executing program 3: r0 = memfd_create(&(0x7f0000000240)='/dev/autofs\x00', 0x0) fallocate(r0, 0x2, 0x4, 0x3) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) syz_open_procfs(r1, &(0x7f0000000080)='net/ip_mr_cache\x00') pselect6(0xffffffffffffffad, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0) 00:24:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) setuid(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x3ff) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) write$binfmt_misc(r0, &(0x7f0000000140)={'syz1', "afa0fd08c1"}, 0x9) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x40000025) [ 125.896826] audit: type=1400 audit(1549499048.860:23): avc: denied { map } for pid=3466 comm="syz-executor3" path=2F6D656D66643A2F6465762F6175746F6673202864656C6574656429 dev="tmpfs" ino=10321 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 00:24:08 executing program 3: r0 = socket$inet6(0xa, 0xf, 0x8) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000340)=ANY=[@ANYBLOB="0180c20000000000140000005dac144ce6aed37d0800450000240000000000009078ac14140de0000001000000000200f5347500000000000000"], 0x0) r3 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r3, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x0, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x8, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x0, 0x8, 0x4, 0x5, 0x6, 0xee}, r5, 0x5, r4, 0x9) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x1000001fa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r6 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640), 0x0, r6) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x20}]}, 0x10) 00:24:08 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000080)="c8", 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:24:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x80003, 0x3) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r1, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="191ae2a955d8efdc76f5b9b776d150f4", 0x10) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f00000002c0)="1a5d6865cbabd4815e22497e790117c66292cd497b4794fd0721e55817199a67f10f0869c3b55fa9d0c012bc591b7c490d49600dd05cf424bc1de8d95b0a75eed241e21f21822d309047044fb0d3bdab375166d56cbf28d15a503739649abcf816331befa8dc07f10fb4a9ab5dd0cd3ce3d5", 0x72) accept4(r2, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000003c0)=0x80, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000500)={{{@in=@broadcast, @in=@loopback, 0x4e24, 0x10001, 0x4e22, 0x7, 0xa, 0x20, 0x20, 0x3f, r3, r4}, {0x6e9b, 0x7ff, 0x5, 0x1, 0x2, 0x3, 0x8fc, 0x553c1e9a}, {0x3, 0x3, 0x8, 0x1ff}, 0x4, 0x6e6bbb, 0x0, 0x0, 0x2, 0x3}, {{@in=@broadcast, 0x4d3, 0x33}, 0xa, @in=@empty, 0x3506, 0x1, 0x0, 0x100, 0x7, 0x7, 0x2}}, 0xe8) 00:24:09 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r2, r1, 0x0, 0x40801001) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, 0x0, 0x40000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) [ 126.062713] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:09 executing program 2: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3000000000000000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x40000, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = dup3(r0, r0, 0x0) memfd_create(&(0x7f00000001c0)='bdev\x00', 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000140)={0x51, 0x8, 0x6, {0x6, 0x2}, {0x2, 0x401}, @const={0xa6, {0x3, 0x87c5, 0x100000000, 0xc1}}}) r4 = socket(0x840000000004, 0x807, 0xff) fstat(r3, &(0x7f00000003c0)) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f00000002c0)="010d8f4540f05e1eae0b500d304d413468eaf934ec4b708c33a97986b3d4c05bd92d8cffb874474b4a2a85bb08d4755de088ea4e990240f422b051b31fd8b16a1fa82cf5e900d387bab0f94ecc2e5f24625ab9a04d5888a852cab09dc7b745ec69e67c89c9a7670e0250ea478ed9e02323ba0604491478b70449c0e18557c6e81d3daf8b9b7ec9b5222c034a10f5d50072318726697ae9f0bc4a654bcb2cb373f20f38d069feb96d9b814aa840bdc00122932457535dc81131a992b74e712bc430204469ca824ff08f0a9ebef13da56290ea38bb9e097782a1", 0xd9) sendto$inet(r2, &(0x7f00000000c0), 0x30, 0x0, 0x0, 0xc9) 00:24:09 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000680)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r1}, &(0x7f0000000200)={0x0, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r4 = socket$inet6(0xa, 0x400000000001, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000380)={0x8, 0x80000000, 0x7, 0x7, 0x7}) fcntl$setflags(r0, 0x2, 0x0) r5 = dup(r4) fsync(r0) syncfs(r2) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000540)={0x8}) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0xfffffffffffffdb5) syz_open_procfs(r1, &(0x7f0000000400)='net/igmp\x00') io_setup(0x20, &(0x7f0000000300)=0x0) io_cancel(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, r5, &(0x7f00000005c0)="f2f42245d196f91a48f2b821d3442e277a43f0ca0ad8ed1b65a81f934bc9a4fdca52f744ec264514eba836b2ca9b2e580d83a0ab4e20c5f62b71ca27af042df6ea32e6c5c9369755e64b56aec0188ec11bcea89595863c737ff8c0f248ad0d9201ff46962f0087fc1990817fdbaf8c2d3ca9a833872d38e2a9", 0x79, 0xf, 0x0, 0x0, r5}, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e000000149280064216da67911be02ac"], 0x22) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x100012f, 0x0, 0xfffffffffffffd7c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) getpgrp(0x0) ftruncate(r7, 0x2007fff) sendfile(r5, r7, 0x0, 0x8000fffffffe) 00:24:09 executing program 4: socket$packet(0x11, 0xa, 0x300) socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0x100, @dev, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x0, 0xc7, 0x0, 0x2, 0x5, 0x8]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="00042bbd7037fbb2ccd76f026800000000000941000000140018000000337564703a73797a3100000000"], 0x30}, 0x1, 0x0, 0x0, 0xd4}, 0x40000) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) setns(0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f00000006c0)=0x800000bc, 0xfffffffffffffe4a) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000340), 0x0) futimesat(r2, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{}]}, 0x10) fcntl$addseals(r3, 0x409, 0x7) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x80, r4, 0x308, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffe}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4040001}, 0x80) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x9, @rand_addr="a070105530f76e9f6e391f35a6a83281", 0xff}, {0xa, 0x4e22, 0x7ffd, @empty}, 0x0, [0xfffffffffffffffe, 0x0, 0x7, 0x66, 0x0, 0x0, 0x6a9]}, 0x5c) syz_emit_ethernet(0x2e, &(0x7f00000007c0)=ANY=[@ANYBLOB="01808200eaff00000000021f00b77b5a04637d7df37c3076fbe700000080d70e7ce161129ccf93ec3d362c7a689cc8a8a1ffe3c05d44af20257a9d6ad502529a209523020000000000000000000000019e3d476faad91b787d59f79983fa74ef2f4ddd7c9f562405f3f8edb72ccad4ce92d5320c99254d4358938bc12fc6e2db2b56c4d107d2943ef9d52cd2fb87665429222cdf2d73e4f446157566c6df9e258038db12789c4c6e5708ebe12b270675b5ead3fd079a9f1fb0f3202e8be40754da480b5dbc29a5ea22dd2f584b3fe7816cbf27fe9f"], 0x0) 00:24:09 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:09 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:09 executing program 3: r0 = socket$inet6(0xa, 0xf, 0x8) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000340)=ANY=[@ANYBLOB="0180c20000000000140000005dac144ce6aed37d0800450000240000000000009078ac14140de0000001000000000200f5347500000000000000"], 0x0) r3 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r3, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x0, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x8, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x0, 0x8, 0x4, 0x5, 0x6, 0xee}, r5, 0x5, r4, 0x9) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x1000001fa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r6 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640), 0x0, r6) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x20}]}, 0x10) 00:24:09 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000080)="c8", 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 126.946066] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 127.023675] FAT-fs (loop5): Unrecognized mount option "codepage=4³7" or missing value 00:24:10 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000680)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r1}, &(0x7f0000000200)={0x0, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r4 = socket$inet6(0xa, 0x400000000001, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000380)={0x8, 0x80000000, 0x7, 0x7, 0x7}) fcntl$setflags(r0, 0x2, 0x0) r5 = dup(r4) fsync(r0) syncfs(r2) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000540)={0x8}) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0xfffffffffffffdb5) syz_open_procfs(r1, &(0x7f0000000400)='net/igmp\x00') io_setup(0x20, &(0x7f0000000300)=0x0) io_cancel(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, r5, &(0x7f00000005c0)="f2f42245d196f91a48f2b821d3442e277a43f0ca0ad8ed1b65a81f934bc9a4fdca52f744ec264514eba836b2ca9b2e580d83a0ab4e20c5f62b71ca27af042df6ea32e6c5c9369755e64b56aec0188ec11bcea89595863c737ff8c0f248ad0d9201ff46962f0087fc1990817fdbaf8c2d3ca9a833872d38e2a9", 0x79, 0xf, 0x0, 0x0, r5}, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e000000149280064216da67911be02ac"], 0x22) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x100012f, 0x0, 0xfffffffffffffd7c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) getpgrp(0x0) ftruncate(r7, 0x2007fff) sendfile(r5, r7, 0x0, 0x8000fffffffe) 00:24:10 executing program 4: r0 = socket$inet6(0xa, 0xf, 0x8) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000340)=ANY=[@ANYBLOB="0180c20000000000140000005dac144ce6aed37d0800450000240000000000009078ac14140de0000001000000000200f5347500000000000000"], 0x0) r3 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r3, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x0, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x8, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x0, 0x8, 0x4, 0x5, 0x6, 0xee}, r5, 0x5, r4, 0x9) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x1000001fa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r6 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640), 0x0, r6) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x20}]}, 0x10) 00:24:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @multicast2}, 0xc) lookup_dcookie(0x7, &(0x7f0000000140)=""/251, 0xfb) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback}, 0x10) 00:24:10 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), 0x0) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x6, &(0x7f00000003c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x101001) write$evdev(r0, &(0x7f00006f7fe8)=[{}], 0xfdd0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x40) 00:24:10 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) [ 127.639640] device lo entered promiscuous mode [ 127.646765] device lo left promiscuous mode [ 127.653251] device lo entered promiscuous mode [ 127.658825] device lo left promiscuous mode 00:24:10 executing program 0: capset(&(0x7f0000001140)={0x20071026}, &(0x7f0000001180)) r0 = gettid() ioprio_set$pid(0x0, r0, 0x2b02) 00:24:10 executing program 0: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ptrace$setopts(0x4206, r0, 0x800, 0x42) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='ns\x00') ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) waitid(0x3, r1, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xdf, 0x20000000, 0xca}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 00:24:10 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) [ 127.801697] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure 00:24:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) shutdown(r1, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'yam0\x00', &(0x7f0000000140)=@ethtool_sfeatures={0x3b, 0x9, [{0x2, 0x4}, {0xfffffffffffffffc, 0x100000000}, {0x9, 0xc8}, {0x5, 0x7fff}, {0x101, 0x101}, {0x55, 0x6}, {0x5, 0x1f}, {0x9, 0x20}, {0x2}]}}) fchmod(r0, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRESOCT=0x0], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX=0x0], @ANYRES32=r0]}) flock(r0, 0xb) [ 127.908254] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 127.964973] audit: type=1400 audit(1549499050.930:24): avc: denied { ioctl } for pid=3602 comm="syz-executor0" path="socket:[11323]" dev="sockfs" ino=11323 ioctlcmd=0x8946 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:24:11 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x4) 00:24:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/packet\x00u\xde\xf3\xde[\xe7\x0f\x19T\xe5\xd0K-j\xd2\xd1\x03\xb7\xeci\xb2JX\xa5\xfa\xcf\xbe\x8e\xc2|\xe8\xf2\x9f\xb0=\x15\xf8\\\xc1\xcaf\xe31\xa3\xe8U:B\xf1A\x86?\x96\x027?\x9f6\x8f\xd3s\\\xb6\x94\xbb%\x993\b\xd0\r\x1eS\xa4\xad[\xc9\x1df\x8d\xff7\xb4^N\xfe\vV\t\x00\x00\x00\x00\x00\x00\x00\xad1F\x01x\xd5\xab\xcf@\xe7g\xb4K\xaa%\xc5\xbc\x97\xa4\xb9\xc6\x81mf\x83\fq\x1c\x91k|\xae\xefp\x7f\xd1\x15\x8bV\x8e\x11^0\rw4\b6\xff \xe7\xebJ\xa4\xf4N|\xa2+\xe7\xbc\xe8\xf2\f\x1eb\x8eG*j:\xce\x97\xc3\xd7&\x12\x84\x15\xa1\xf7\x15ZZe\xa2B\xddN\xed\xbb\xf3{\r\xac\xf8o\x98h-\r\xcei\xf2\xa8THq\x83&\xbb\xe4\xfdS\xa7\xa6\"PmA\xd2\x1f\xa8\xf0\xf5\x84\xcd\xc5$') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) readv(r0, &(0x7f0000004280)=[{&(0x7f0000002e80)=""/4096, 0x1000}], 0x1) [ 128.019021] audit: type=1400 audit(1549499050.980:25): avc: denied { setattr } for pid=3602 comm="syz-executor0" name="NETLINK" dev="sockfs" ino=11323 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 128.061082] FAT-fs (loop5): Unrecognized mount option "codepage=4³7" or missing value 00:24:11 executing program 0: r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r2 = dup3(r0, r0, 0x80000) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000000)=""/36) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000004000)=ANY=[@ANYRESHEX, @ANYRESHEX=r1], 0x24) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) 00:24:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x23, 0x0, &(0x7f0000000040)) socket$key(0xf, 0x3, 0x2) [ 128.136479] audit: type=1400 audit(1549499051.100:26): avc: denied { map } for pid=3618 comm="syz-executor2" path="/proc/3618/net/packet" dev="proc" ino=4026532326 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1 00:24:11 executing program 4: r0 = socket$inet6(0xa, 0xf, 0x8) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000340)=ANY=[@ANYBLOB="0180c20000000000140000005dac144ce6aed37d0800450000240000000000009078ac14140de0000001000000000200f5347500000000000000"], 0x0) r3 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r3, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x0, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x8, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x0, 0x8, 0x4, 0x5, 0x6, 0xee}, r5, 0x5, r4, 0x9) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x1000001fa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r6 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640), 0x0, r6) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x20}]}, 0x10) 00:24:11 executing program 2: io_setup(0x80000000000004, &(0x7f0000000240)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2!\x82\x16\xa1\xc5\b\xf7\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcc\x06\x01\x8dSj\xc6\xfb{\x9cA\xb8\x19x\xc4\x16\x17\xd48\x91\xd8\xd9\xf7V6@{_\xf3\xdc\x8eh\xbdL\xf3\x9b\x83\xb6\xb2I\'\xc6$\x0f4\xaaa\xa1F[\x9e\x98\xa86\x82\x03\x1d\x95W\x8f\xf9C\xa9\x83s\xd0\x13\xbcDI\x06\xf6\x8e\x94\xd0#\x19\xf65Y!\xc1}\x81\xf0>@\xbf\xa3B:\xa8W\x84\xdc&\x87\xcb\xba\x85\xa6\xa3\f&\xa7\x87c{\x13\x9b\x1e\xbd\xe9\xc0J\xb3\xe6\x1d#h\xad\xa9\x8ce$\xca\xf1p^\x97\xf1\x17@\xc1s\a\xe6\x05(\xc4Q\xea\x04:fl\xb1\b\x870:\v\xf1\xaa\xa3\xe9\xb3\x8c\xcb\xbe\x04l\xd2\x85\x13\x87\xe0!d\xda&\a\xffG4bo\x83\xc4~o,\xb5\xc0\xfdk8$_\xf9l\xf0\xfa\x1b\xec\xf7\xdd\xe2\xe3\xc2\xc8\x05Pvu\x92@\\\xc4\x10\xfe0`\x98\xd3\x12\xbe\x05\x9f', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x315000, 0x0) write$smack_current(r2, &(0x7f0000000040)='-\x00', 0x2) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) ftruncate(r2, 0x1) io_destroy(r0) 00:24:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r0 = dup(0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x194, r1, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x10000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x101}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="de939e602311d7d3fc5c9a8e14a32be7"}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x98}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x78, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x50}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x11}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9f}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xb7}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffe01}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8080, 0x0) write$selinux_context(r2, &(0x7f0000000040)='system_u:object_r:udev_rules_t:s0\x00', 0x22) 00:24:11 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000140)={'ip_vti0\x00', 0xfffffffffffffffc}) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfd, 0x30001000}, 0xc) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x6e4}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt(r1, 0x0, 0x0, 0x0, 0x0) 00:24:11 executing program 3: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x1c, 0x800) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000000)={'vlan0\x00', 0xfffffffffffffffd}) r2 = socket(0x2, 0xa, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000040)={@dev}, &(0x7f0000000080)=0x14) getpeername$packet(r2, 0x0, 0x0) [ 128.585410] syz-executor3 uses obsolete (PF_INET,SOCK_PACKET) [ 128.757910] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:11 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) preadv(r0, &(0x7f0000001180)=[{&(0x7f0000000040)=""/9}, {&(0x7f00000000c0)=""/145}, {&(0x7f0000000180)=""/4096, 0xfffffffffffffedd}], 0x10000000000001e4, 0x0) 00:24:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000000)=0x7ffffffc, 0x4) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) munlockall() sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0), 0x0, 0x2, 0x0) 00:24:11 executing program 2: inotify_init1(0x0) sched_setaffinity(0x0, 0x3bd, &(0x7f00000002c0)=0x3ffffffffffffff2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, &(0x7f0000000200)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$getsig(0x4202, r1, 0x100000000, &(0x7f0000000000)) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000080)={0x5, 0x7, 0x3, 0x3}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 00:24:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010001080400418e00000004fcff", 0x58}], 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) 00:24:11 executing program 0: eventfd(0x5b) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x80, 0x4, 0x4, 0x0, 0x1f, 0x8080, 0x1, 0x1f, 0x2, 0x7, 0x10000, 0x8, 0x3, 0x0, 0x77d, 0xc9, 0x1d, 0x5, 0x2, 0x9, 0xffff, 0x454, 0xa5, 0x3, 0x7, 0x20, 0x6, 0x4, 0x7, 0xb17d, 0xc2, 0x1, 0x80, 0x3, 0x84, 0x0, 0x3f, 0x2, @perf_config_ext={0x3f, 0x2}, 0x10002, 0x9, 0x8, 0xd, 0x4, 0xfffffffffffffffd, 0x80000000}, 0xffffffffffffffff, 0x2, 0xffffffffffffff9c, 0x9) r2 = fcntl$dupfd(r1, 0x2, r0) write$P9_RREAD(r2, &(0x7f0000000200)={0x75, 0x75, 0x1, {0x6a, "fd4fc223266702583a9baf43c6e2e81ff183075039c4c6b5c7f9098c024a05d6fa7e217a660c3a14f4dfb88b01cbed0c09b312a64b839379c78e4f88c85bd63728783449de07acf28af8ed2dbb9a4e1c36e04ead2789552606aa4acb731292480be8e765d6b39cef694d"}}, 0x75) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x21d6dde6cf3402c2, 0x1000004) recvmmsg(r3, &(0x7f0000000000), 0xd0, 0x10124, &(0x7f0000000000)={0x0, 0x1c9c380}) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f00000001c0)=@v2, 0x14, 0x0) [ 129.052500] FAT-fs (loop5): Unrecognized mount option "codepage=4³7" or missing value 00:24:12 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x94, &(0x7f0000000040)) io_setup(0x69, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x244880, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$RTC_WIE_ON(r1, 0x700f) 00:24:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x85838) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x33, 0x0, 0x0) getpgrp(r2) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 00:24:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02130609100000000000004c9e00000002000b7b02000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a000000000000000e0000190000000000170000000000000000000000008000"], 0x80}}, 0x0) r2 = gettid() r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x5, 0x5517, 0x5, 0x0, 0x0, 0x6, 0x10000, 0xc, 0x0, 0x6, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x100000001, 0xd652, 0x8, 0xfff, 0x1, 0xfffffffffffffffd, 0x2d4, 0x8001, 0x3c, 0xc16d, 0x0, 0x7ff, 0x1, 0x78, 0x1f, 0x8, 0x6, 0x128, 0x3ff, 0x38, 0x80000001, 0x7c31, 0x8, 0x4, 0x0, 0xa7a, 0x1, @perf_config_ext={0x101, 0x2}, 0x4, 0x200, 0xff, 0x3, 0xcf3f, 0xa65b, 0x7}, r2, 0x9, r3, 0x1) sendmmsg(r1, &(0x7f0000000180), 0x400000000000002, 0x0) 00:24:12 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x400100000001, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @rand_addr, 0x1000000000000}, 0x1c) r4 = dup2(r0, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000040), 0x4) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0xfffffffffffffd18) 00:24:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) [ 129.657886] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:12 executing program 2: sched_setaffinity(0x0, 0x376, &(0x7f0000000280)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000400)='syz_tun\x00', 0x10) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000180), 0x0) sendto$inet(r0, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x114}}], 0x789, 0x2, 0x0) 00:24:12 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0xfffffffffffffffe) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/ipv6_route\x00') 00:24:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000300)=0x80) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f00000000c0)={0x8, {{0xa, 0x4e22, 0x0, @dev, 0x8001}}, {{0xa, 0x4e24, 0x8, @rand_addr="58b11016b487cee28f1d20575948d67b", 0x9}}}, 0x108) sysinfo(&(0x7f0000000240)=""/58) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x80000006}]}, 0x10) 00:24:12 executing program 5: mknod(&(0x7f000086c000)='./file0\x00', 0x1037, 0x0) r0 = open$dir(&(0x7f00004be000)='./file0\x00', 0x80000880, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) close(r0) creat(&(0x7f00007dc000)='./file0\x00', 0x400) 00:24:12 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x1f5, &(0x7f00000001c0)={&(0x7f0000000540)=@getae={0x40, 0x1f, 0x1, 0x0, 0x0, {{@in6=@mcast2}}}, 0x40}}, 0x0) [ 129.928999] FAT-fs (loop4): Unrecognized mount option "codepage=4³7" or missing value 00:24:13 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x489) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000140)) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x7fffffff, @remote, 0x7}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:24:13 executing program 3: r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x7e}}], 0x400000000000070, 0x2002, 0x0) accept$inet(r1, &(0x7f0000000180), &(0x7f00000001c0)=0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x644840, 0x0) ioctl$TIOCCONS(r2, 0x541d) ptrace$setregs(0xf, r0, 0x2, &(0x7f0000000040)="ce31c8c57ff754dacb40c4db3da3e17412ee7e2cfd22e4656174fb45a09a2af2a4ec8175dc260c359f2c8294046c4bcd92dfac795ec9ed4c0d57393c84a8f0852729c9fc84b5193ffcc2265ce6e9aac9cf7f8fc99e8e43d7f1b7afd1bf9c38ec78df41336a52d6df8bc6ad828de247427873b4fe6508f8ba4dad93c1d969c467301012f4702a839dd5593b62145bba18eb5c30ceddcc2735f11c33b52da3122c4b1e99932dc5ef970b79fb60b9f60c0cf47c8f7adda8c2c3db12049e140044a33886e27a8a8e6c906fc1dcd23e5cc87d73087469b76733516fdb484788") 00:24:13 executing program 2: sched_setaffinity(0x0, 0x376, &(0x7f0000000280)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000400)='syz_tun\x00', 0x10) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000180), 0x0) sendto$inet(r0, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x114}}], 0x789, 0x2, 0x0) 00:24:13 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0xffef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioprio_get$pid(0x1, r2) getdents(r0, &(0x7f00000001c0)=""/4096, 0x1000) close(r1) 00:24:13 executing program 3: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x1, 0x1, 0x2, 0x7f, 0x3, 0x3, 0x2, 0x6d, 0x38, 0x27f, 0x8, 0x1, 0x20, 0x2, 0x20, 0x1, 0x100000000}, [{0x0, 0x200, 0x3, 0x9, 0xae, 0x0, 0x7f, 0x7}, {0x2, 0x9, 0x4, 0x800, 0x578, 0x4, 0xef, 0xb04}], "a3f01518ec13c55975d851e7d58f26b3a5c408f4c848641494cc677ba9a95ba9d9dc9542cc55061bf681d475246bac2537e3df4f6cd6c5b6c73b884975c1e7167972da4849d3abe58dc8ac3e1c17f41b3af9471d0606c1d439aca0c78cfcd45e7ec84fee33aa8c", [[], [], [], [], [], [], [], [], [], []]}, 0xadf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000000)=0x7b) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 00:24:13 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x4010000000, 0x0, 0x0, 0x0, 0x0) r2 = getpid() socketpair$unix(0x1, 0x810000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f00005ebff8)=0xbf3) fcntl$setownex(r3, 0xf, &(0x7f0000000000)={0x2, r2}) dup2(r5, r4) [ 130.517381] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:13 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0xb989eb0a37d7e0df, 0x8, 0x1}) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r2 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000200), 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 00:24:13 executing program 0: socket(0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/ptype\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{}, {}], 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') getxattr(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=@known='system.advise\x00', &(0x7f0000000500)=""/135, 0x87) flistxattr(0xffffffffffffffff, 0x0, 0x0) ptrace$getregset(0x4204, r0, 0x0, 0x0) 00:24:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) capget(&(0x7f0000000040)={0x39980732, r0}, &(0x7f0000000080)={0x5, 0x8, 0x3, 0x3, 0x7f5c, 0x200}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getegid() mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 00:24:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x38}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RWALK(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="ad"], 0x1) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x24048090) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) fsync(r1) openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) [ 130.851425] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 130.851463] mmap: syz-executor4 (3818) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 00:24:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x8000000000007, 0xa0) close(r0) 00:24:14 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:14 executing program 2: sched_setaffinity(0x0, 0x376, &(0x7f0000000280)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000400)='syz_tun\x00', 0x10) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000180), 0x0) sendto$inet(r0, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x114}}], 0x789, 0x2, 0x0) 00:24:14 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x600000, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2f, 'cpu'}, {0x2b, 'pids'}, {0x2b, 'cpu'}]}, 0x10) [ 131.145760] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:14 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) clone(0x10202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x7f, 0x1}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0xa16) [ 131.270311] EXT4-fs warning (device sda1): ext4_group_extend:1733: can't shrink FS - resize aborted 00:24:14 executing program 3: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x1, 0x1, 0x2, 0x7f, 0x3, 0x3, 0x2, 0x6d, 0x38, 0x27f, 0x8, 0x1, 0x20, 0x2, 0x20, 0x1, 0x100000000}, [{0x0, 0x200, 0x3, 0x9, 0xae, 0x0, 0x7f, 0x7}, {0x2, 0x9, 0x4, 0x800, 0x578, 0x4, 0xef, 0xb04}], "a3f01518ec13c55975d851e7d58f26b3a5c408f4c848641494cc677ba9a95ba9d9dc9542cc55061bf681d475246bac2537e3df4f6cd6c5b6c73b884975c1e7167972da4849d3abe58dc8ac3e1c17f41b3af9471d0606c1d439aca0c78cfcd45e7ec84fee33aa8c", [[], [], [], [], [], [], [], [], [], []]}, 0xadf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000000)=0x7b) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 00:24:14 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x78, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_GROUP={0x8}, @IFLA_XDP={0x50, 0x2b, [@IFLA_XDP_FD={0x4c, 0x4, {0x0, 0x0, 0x0, 0x0}}]}]}, 0x78}}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x40, 0x0) syz_open_pts(r2, 0x101000) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/enforce\x00', 0xc440, 0x0) write$eventfd(r4, &(0x7f0000000400)=0xe75, 0x8) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)=@ipv6_getroute={0xf8, 0x1a, 0x0, 0x70bd28, 0x25dfdbfb, {0xa, 0x80, 0x0, 0xa3, 0xfc, 0x4, 0xff, 0x7, 0x400}, [@RTA_PREF={0x8, 0x14, 0x5}, @RTA_IIF={0x8, 0x1, r1}, @RTA_UID={0x8, 0x19, r3}, @RTA_MARK={0x8, 0x10, 0x60fdffe8}, @RTA_METRICS={0x90, 0x8, "f495a5c41900a8bea0d8be4f999f935635faa8ce659905c1b10dbaa415df1f8a4c621f6f44ca1a00af69174954646cb360f2f9af5e85d1ad1221af85184282e35a0953f112b325d5283bb1270663b5a3db02cb40bdf2872e5dbbc2763b3efadf7730ddbae568c3eace6f28dadb8db226823b19cded99267dfd2742519fa046e51734c1cbb0169bda6be3"}, @RTA_ENCAP={0x1c, 0x16, @generic="660bd5e69bf427d648ba948fc66d576d2bd7ffc41607"}, @RTA_EXPIRES={0x8, 0x17, 0x7}, @RTA_PRIORITY={0x8, 0x6, 0x8}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40000}, 0xc0) 00:24:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x38}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RWALK(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="ad"], 0x1) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x24048090) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) fsync(r1) openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) 00:24:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x14, 0x0, &(0x7f0000000080)=0x83) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000200)=0x1c, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000240)=0x1, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) r3 = getpid() sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@RTM_NEWNSID={0x24, 0x58, 0x200, 0x70bd27, 0x25dfdbff, {}, [@NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_PID={0x8, 0x2, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x10) write$P9_RWALK(r2, &(0x7f0000000040)={0x23, 0x6f, 0x1, {0x2, [{0x50, 0x0, 0x5}, {0x4, 0x0, 0x2}]}}, 0x23) [ 131.355935] A link change request failed with some changes committed already. Interface ip6tnl0 may have been left with an inconsistent configuration, please check. [ 131.411314] audit: type=1400 audit(1549499054.370:27): avc: denied { write } for pid=3874 comm="syz-executor2" name="net" dev="proc" ino=10888 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 00:24:14 executing program 4: inotify_init() r0 = socket$inet(0x2, 0x0, 0x0) r1 = dup(r0) add_key$user(0x0, &(0x7f0000000140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003b0e000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="91c46cd3ee1d49b30688c74cc9211bfa2884967804a90f7bfa634d347853b1d14e21281c1ebc35c8ea90a74056062232d61cb9323a7efa7c554a4a10b5c42b6cde1b0962a61c9305731944d43a2bc2c2501313e48bf1f8d46e0c1c28d36ba4786ab0c740f9a2647e09bad0adafbe3d8e", @ANYRES32=0x6, @ANYBLOB="1800120008000100767469000c00020008000400e0000002"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 00:24:14 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = inotify_init() rt_sigprocmask(0x0, &(0x7f0000000080)={0x100000001}, &(0x7f0000000140), 0x8) init_module(&(0x7f0000000000)='\x00', 0x1, &(0x7f00000002c0)='\x00') r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000440)=@fragment={0x21, 0x0, 0xf7b5, 0x10001, 0x0, 0x5, 0x64}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000480), 0xa198) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xc4111, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x300, 0x70bd2b, 0x25dfdbfc}, 0x14}}, 0x0) fstat(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x8, 0x0}, 0x4e24, 0xe21e, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x3b, 0x0, r3}, {0x7, 0x3, 0x2, 0x7, 0x0, 0x7000000000000000, 0x7fff, 0x9}, {0xb42, 0x2, 0x3, 0x9}, 0x78, 0x6e6bb9, 0x0, 0x1, 0x1, 0x2}, {{@in=@loopback, 0x4d6, 0x3f}, 0xa, @in6=@mcast1, 0x3504, 0x0, 0x78ab7f3c57ab2f17, 0x40, 0x1f, 0x3, 0x100000000}}, 0xe8) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x8}, {0x0, 0xfff}]}, 0x14, 0x1) [ 131.468521] A link change request failed with some changes committed already. Interface ip6tnl0 may have been left with an inconsistent configuration, please check. [ 131.524825] audit: type=1400 audit(1549499054.380:28): avc: denied { add_name } for pid=3874 comm="syz-executor2" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 00:24:14 executing program 2: sched_setaffinity(0x0, 0x3bd, &(0x7f00000002c0)=0x3ffffffffffffff2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x2) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000080)={'ip6gretap0\x00', @ifru_map={0x3, 0x1, 0xfffffffffffffffb, 0x7, 0x81, 0x88c2}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000340)={0xf, 0x1f, 0x2, 0xfffffffffffffffb}, 0xf) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'tunl0\x00', @ifru_ivalue}) connect(r0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) ptrace$cont(0xffffffffffffffff, 0x0, 0x6, 0x0) connect(r2, &(0x7f0000000380)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0xa76, 0x4, "3b17424addf0eb238c93fb4721047dedfc3da51b500c30f7544197071ce6324daf944884916215cc9a39e20c25538c76fc952099ad9f97d2f5bdad800dab92", 0x3d}, 0x80) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') setns(r3, 0x0) [ 131.567649] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 131.591126] netlink: 32 bytes leftover after parsing attributes in process `syz-executor4'. [ 131.670322] audit: type=1400 audit(1549499054.380:29): avc: denied { create } for pid=3874 comm="syz-executor2" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 [ 131.672145] netlink: 32 bytes leftover after parsing attributes in process `syz-executor4'. 00:24:14 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000100)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs(r1, &(0x7f00000001c0)='net/netfilter\x00') 00:24:14 executing program 5: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000000)=0xcc) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x100) r3 = dup(r0) renameat2(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x2) setreuid(0x0, r1) capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) setpriority(0x2, 0x0, 0x0) 00:24:14 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0xc0403, 0x40) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x12) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) preadv(r2, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:24:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x3c5) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x30000001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000300)={0x332, 0x0, 0x0, 0x0, 0x0, 0x0}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) fremovexattr(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="8964bc06141857d9b8c216c1188ac4d123f8cbf72d4d4b64966dead1447cc3d9bc0396a55ab62bc3da8ea2943fdb7c659bdc39bd3c5ebfde320422f2742deb8c5dda9ac7ce76a7da1769a21da8bcb3164b6fa2b003081fcd6795b426a86a346a3bfac13454daf8da3ce4ec9fce0389e038905e35b81bccdd10d5703f94976d566a98637a6f089ffd5b23408a9b2a2e95f338488a4668fc13514001064bd6f6bce433301b6fc8655e577c8601c923dbf764fe9b8f6de779a2528c0f"]) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000480)) r4 = socket(0x11, 0x80000, 0x9fa) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000380)) accept(r4, &(0x7f0000000040)=@nl, &(0x7f0000000180)=0x80) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x5, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) [ 131.927804] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) [ 132.106836] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 132.124522] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 132.148854] attempt to access beyond end of device [ 132.171679] loop4: rw=12288, want=8200, limit=20 [ 132.187372] attempt to access beyond end of device [ 132.192966] loop4: rw=12288, want=12296, limit=20 [ 132.199223] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 132.206399] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 132.214239] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 00:24:15 executing program 3: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x4000000000000002, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/22, 0x16}, {&(0x7f0000000280)=""/5, 0x5}], 0x2}}], 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) [ 132.222613] attempt to access beyond end of device [ 132.227602] loop4: rw=12288, want=8200, limit=20 [ 132.232690] attempt to access beyond end of device [ 132.237825] loop4: rw=12288, want=12296, limit=20 [ 132.243138] F2FS-fs (loop4): Failed to get valid F2FS checkpoint 00:24:15 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:15 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280), 0x115) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) open(&(0x7f0000000380)='./file0/file1\x00', 0x0, 0x0) munlockall() r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') ioctl$BLKROGET(r3, 0x125e, &(0x7f00000000c0)) sendfile(r2, r3, 0x0, 0x80000001) [ 132.601060] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4}, 0x1c) r1 = dup(r0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={r2, @remote, @local}, 0xc) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x7, 0x4, 0xf75e, 0x3, 0x5a0a}, 0x14) recvmsg(r1, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/106, 0x6a}, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000880), 0x220, 0x0) 00:24:16 executing program 5: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000000)=0xcc) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x100) r3 = dup(r0) renameat2(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x2) setreuid(0x0, r1) capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) setpriority(0x2, 0x0, 0x0) 00:24:16 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:16 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$UHID_INPUT(r0, &(0x7f0000001880)={0x8, "f5a68ff5b721a5de4ec10d79fbec0b4901c1211903adc48c79a88a78caa6b1ce317171b16fe550b3a3d21c1910284101fca086b01bbfe0526f8d36a43cfe4d60930c8b93bd1c92b7ce9f7d02c98b19ad4607a1159c7f24da24159bd691ff5bf53775a5059d63b6435190efe0a7c84bf22a27abe385c169c0b4b8618f8f444aa225a2bd3adb3c0b45a2152b0db3c0f563a5963d469844868784990f211817606e63b5e2a183762b7668287bcbe6ba640719e26be55240442564737bc8e0b6a395585acb0532134e879bffa6b7a3efa93fb2e5e82998eaa69223dda2bf27015ab80416b215eb1ca4dfde6d3a38675db4755521b43ea238c3eb321f168e53f7cdba28c6249cb8508d49a775e6c63cd82249f77eb73153d23712c1f421622c25b00873cf6d39dfb714c0a27e23a08d3cb95a3baa481cd5f59b385147119eb27c1c797b654efde3c0b84fc1021217377ab7cab850a8eac61d84a8f96587d0e014d2db6b3feebdddc522d8b6e4944cf855fb5f15c738f899500560aca02e0cf029e3b3e4facf16d2757ae178020bf972784421c6a5f09d377a774ba1d0150921dde8590b2ece70b0ac9376d19fe91cb610090d755b9a0220977ea9df341909a179c0e85f63718f66bc9ca38c0c31740820a8be259a6d7f5c0008ac67026840845fc103f73c29fc4fba6de98273e7c1feaf47dc3d952420370bd127c5a8f1a795a8e5420a071a8973fb82391e9f684c36c9c0a0c645c4ff1233c5fb6b67a442365af09fbb0e8cfc9440f4554e024f9ccb3161ce8f0ea301762bb591c92b8e785b10e8a266fcbcc262a49c57103a56f7b42db76eefc4f17a6b7b19cc158761f939b544ac704845600c6cfbd36906df82bdeb5dd39c8c59f16ba1529b80405d5ef2aa232cd18779a7ddea04a833c9b93f34312bdf536baaead5b3c8ea6fafa747f8bfd9d72d5138adb9ca3246eb1fd3df953a8a2f60ac436af0d587b78b6d767b1c110540831a603766d6dacf39cf14c0d1ec6bea100a47f651cf7d515cee9bc0b952c2cd61e2d448bc6745abc192101b0179c366993482c140d642f282919500d85e1daa921f37a79662823a4f4174d762f9affe2475ed6dc9b820e6ac99684903da5f19fb914bf71260ba60fb111f4732df99a284a33825e73ad21832f1c1769d26e966e542248f1e1a0a93fe0464f6d610853ec41a3b5efa2590ce7726c8aaef82e8e0341360aacaf8c4c142fc4d9dd15cff3c2a287a9832447ebcc78a690ca86df3d1a209c538a97f61f419a3e1ea9aac045ed619a34e9d792255f044676bbb51aba745a2688eaa8e0389ec82c7dfc1af899227d63cfecb3e722cac73efb3f36715f66f4f6a203012ad3d9c20b96fd017711b08bb13fa876c37866f68db04eab49f4fe5df21196ccbb1f65367e70e39fd74897251800cc334b3e67bd79c32f9e9d2ce9468a5336ed34c13926bae4b10e26c93062c21573f140b626e694a155022e10e629605532a665badf3dd0e706aab9885b46811a7f71b0d21636352a3a7f3e291dfad9f88df5524548c1ab2c025e50327fb09625b9af041cf3cf0abf99ebb529046dea4ae5a7c5eae6edf73ff73af23ae25f91373dd90f42f29e63e84f8c1fbba4ab7240ed92799cdbf1627353d0a3b83e0460b3b635f112b1fa81c3dfa834f6a5b93dc06f239d0338f463b1b9973bf9a6b371dd409c45a18114e7b0194065bf9db6d36496bc612db328bf5ac9e513ab282c841d6c282ad2e7ef97eac19f34442a28163f1e58b156a4f29a70f361694f3ba90caf6cd35b521a6fbafdfcd13d4a2dbabff3ad6f67b9f054eb7316d8418337bd8d29508f68bd88108e6ca5d1622efae6663882d19e44431832a1c01bb0df119a98c5623a7b7b79b8f9ec7c32c79f96888b1ce0f3cc6cfb4747f531c6a5a7cc6616fe05e2147a6e6211a8b1f4390954632b0f9bd1d2a9110b0c70ef24dba7706334c6e667b630a48d62977d9d3c91e4071f026d398f0ef41482d71649264805e83dc0b49ac40ccbe808dc45b277020c504d529566ef2102f839ef34e80c2138596f2d62b8208475a58f12a9e8253f4aecce1e7cdcd869c145eec4d5d944285225505698dea82da669c979e1a9223ddbb4701ea552477c6d260e419591e521a5c46cf016a07e005aeb7956360e2bdd996231e7584d0bea1a36dda708e57a6fc7817aaca7948222712f501ab99837a8882e6f903a7b53327f83b78b7e1cf312aabc161ebf464a053ac0c8714d1a10bf3d13ac3f821d49d0b1f839dd8c437b6ec4ae8957402c22341a651a6783dee38efe46b94deb3aa35da12946d2b6d8bd696c2688aef0ec97f98fb5bc61831d45c1c0d0b8776d4c22857e85647932371587d865218e741e0ba545393ebd4644623432dfe0bbc606d01cce67041b2aa5e4e6c2a275f7019983e2e00db7d3daea01008f22a454c538a317727cd5765dac13178edc13fbf78c1fdaf8253e3e40e594e8d3c4664df9127b742f18ed1d5a955150323c68365496750966eee9ede9da889adae384cc23b3b3b704ce9d32fd61f7c2810b3f7273adfe9d0ef1f6e6f77ea518169ae6115908c2455b208a1a0fcd435fc50c4bcbc8655e4b22177e791aa2611d4ab0eb3467609cff07d541bbe2b6595c6839c31902ed7f54307ce636beb99d9919849236b6a7d61298f5d8314fc5522b4c8b7019dd43f83b7e3f95fcb418f7b84fc26f0b709f20eb01b2577c7d43ec576c69961aa1d8c7ac4e6871d0ac09c6ac0063720282407af6ec9d2e6073fbfc3e9a59dde69dda814e7ee01fb60f53af4959fda201d8d442a4edfc8e96f8b6917173c3e98abc7b794794e51453138a4df71eadde7125769b13ef7b0c4477673d9ad101952ad8bd1f375c27e532cfc1a76db07f8f0dad43c777f1a0de1ec5f5fbb0f43a00f7844438395c93d1471b129132af4f29bc4f5c07bfe2edb6ccb03ba7073d66f18efff13668bf149a7bc3220b1f14452ae12e0fd1bb612059040affc406d1a7b0f1e4d570e7da813b87ba0e83f2be9a212b661ec7899b1e13ff2c2929651a942139db48ca4741f90081c9776dea49ac1baa85308667bf25bb0419a73ba26465d11e41ca946babca3394869e03297b08992837ebb979a47845fe2427689b5a99bac23ea484856c06f4a23f678afa7553a7b92141383277c5b2c69ecccd0b7fd29ca2fe60cdd25a9a5e01a44e8862422c3b46d6eef0e7dd095e468a2912266c402c529f312bd04d2e385298e9ab707ab1cd5b31b8c9ddae60330fd8b4b86a10267680a73126b775b984a908c7067ad3988ec620276bbab6320a2ef33e2a201ec34b11386f370fe5211c07b255247acb93b4ea916b6555719c21f50114823d5b7c8b8f87931948aa4b0e42de939aaeea5663d4a5989c85a677b428e9b1d1150dfe1ca4c954bbc68b81f50b7dc1313ff000b57a429d8e2577dc13105f0cc732f69577d40fe37ba87f2daec5b67ab476634f9a388eeeb9ac30fd86265aefea6b533e21ac05a74ff9e68abf04a7c1b0821ffcd0716a04c71d8b443844779182c775e56d750d197ca6621db276ef96750ccddede1d321f4bcf84b216db559095e4cbe836dd2f9e9b4f504ed9fa4040d51289ee52aea30a38086d6b9eac4e951835ca48985b35c30738cdbe264263780e0267b2384f54e9e604a404408d6faa487a3ebd234b31a97f009fca852da9312548cded347097c373267af175936eefeff58c60ce8d97b0a2c18d56cef1c6a88232bcda8a38c35f1b0af97869d438da448ee8fb4de828edd1e91987bedf4b8af4806437ba6bf0d114aeb4425eb54714c87ea6f18fa56b78f64d3a1247d6425a1bdb88118695e3e19edcd8d831b9c58a81961e24417f1e0fc6942d7c753034ded2a905745987badd20eb080a89db3dd126db163126abba345c19069bd5f1bbe58bdc73919ff2a583713bcc1d11dc1e1b38e972aeed2fe7d68af799c8469d6958ca10fd55007ec8e9183fc7a63d0e11b8ec3fbc44a08153279f941f621dde03d98f8d997201c9ac7df57f0e7084b50f20737dd5046536b022bc40af0215f4cbe80c8a967a03fa3a32814c09ee110f46bb579198fa4fc3a1b3a3c044b3441e7d0a605ab749bbf046619e5121c06697b67f129269236b3169ea0680b47e21729b4f55282777b17e1f9498982b23a6a20d75bb0343af48e2cb37d109cfd04a010a6b9f94025bdc2110d0ce77d96c0748fac497675813910e38fd2a4927d71b104d50297bfc81f8f717aa857d0be1956ef205f3e0a7222922ec76a3bc7d0d15f7ac7f1126ebcbbb69494869c3e519ac250e83287261eb65afd6112bf0697ad2d846d291ac390ce76c0e9182cbf51ffea17d53c41d4f1f01161608d30eca76aae4cfd24afc2c8cb61a962a351ae847a6957f9691057306e70ed32914578cc0e7644b843d415cb311a7460be240f2b5dd6b9561ccd862dd473398d571e19ad3d861502bdde17feba8e2dde9cc113be35f92a385403a935fa4f1b34d9a5c1f5802ca1fc4817a54a162c01b4ffeba9504fb911cd3b983e54ab2f3178e952852a0415fe332ce78f0881fe0b64e5e5bfb4563b8f0fa612bf4d0e973d1c3925bcea86dcdf17d074441e24c646d440813b181ab53ea91ef02673a7a21d4f993aef4bab0e0e9f6865818518e2a03f11567fecbc25d1c64edc8187b7116e23f8593d62cefee8f1a6ea083e881598174fdf4c89b24a862d878bfc07a8c056bd535a0387a5023705ffcd991a896bbe346e3eb094451e8b5e6ad513d5338705ef2334bb6be49627afb63149702f99c825454e064ae9d058f847dafe039d2f98dc0f37c19495346c45f72ba2d734c101ca1054987c7e1fa1a4c5b9a26106d0c0a6d8ddb7359b1636c3302e9aca519516fb8bca8cc940d11fa8332667ec9d822e2d790adccaaf9b779296e5ffdf944fd25a8da9f1663bf980b3ac45773404bc1945a1ea30f3f53d0c351451875b0c12fd57014c41c2540144d041f7077bd13b64e73d4cc81e30446933fba067a18b889b67d81bec29b6cce569509da0761445951e4fae53848ccdcb8ac08f013e49c91f7b0a76f0fed75dab32681c6b424f6ba56abbe15dbe3bb61f88c446531c97193bff1423181cdd94239743093fbbacb833296f360f82f4bfe57d70d992ce8bc71b8b8b6186552d347f5936dc4fffca2dfbdbe44ce5b4786e3e81120a6bcd7a5e19b008cf88c07eac09a887cc1d93e996218efbfcfb032bca1cc55488826ec3b03264f88662329ef30fa0d3875e093a3ec7a84004969b40858a637d48f2990612e2ed52883539a068f1945f1d12d452cddc2a78a6572eed51fc3e91c34331c2329bb506b4a866ed20756139be8681aa2847d7fcc242c1eff5fd8de8e7411ea8d3f063d3e69c18d74112a4cc3af413d0bc0184ba5d46f13fb4001151e0a522741faa7a030e63aabf1cdc729d7fdc10d687e559a0c76176dab6757ba6ad3b9008953fe6ecf7f978747a5f3d79ebbafbbeb468d439046ec42aec348cfdc48e589e4df7457fef22cca7c5863459f1604ae0faeb14e4c9c45554162626433f1bd71562454aba31d697fefe9bc50c0f12138dd11b6c0a0b562dc3b5b1097520e6a6fea8ca90cdac914121b729879b675db5f5c89f5599b3f146c9c5a2c6d11cf88ea302630df7474e806c997dd13e7b4c90c99feff125131ccb6e0cade9c002f547955398ed7e1123d54d8ef5c2f734254a0183d97393beea447d24e3a68fd388d716c124d2a1898c83930f9e31b350d3dfa0d601696dafb04cb34fd4a98acc19", 0x1000}, 0x1006) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r2 = dup2(r1, r1) stat(&(0x7f0000000100)='./bus\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x300000, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xff}}], [{@context={'context', 0x3d, 'staff_u'}}, {@euid_eq={'euid', 0x3d, r3}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}, {@measure='measure'}, {@uid_gt={'uid>', r4}}, {@subj_user={'subj_user', 0x3d, '/selinux/avc/cache_stats\x00'}}]}) sendfile(r0, r2, &(0x7f0000000040)=0x5b, 0x5) fcntl$setstatus(r0, 0x4, 0x44000) readahead(r0, 0x0, 0x1000) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x0) 00:24:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2800, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x40000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6596) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r1 = socket$inet(0x2, 0x80003, 0x3) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000040)=0x40, 0x4) recvmmsg(r1, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:24:16 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:16 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@link_local, @random="98985cbd8890", [{[{0x9100, 0x3bd7, 0x7, 0x4}], {0x8100, 0xf0a, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "60c094", 0x10, 0x0, 0x0, @rand_addr="c8891f4d2d19b7d5e2f8573ecaef3163", @mcast2={0xff, 0x10}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "3297d7", 0x0, 'a0*'}}}}}}}, 0x0) 00:24:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000000)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) ioctl$TCXONC(r3, 0x540a, 0x2) [ 133.307618] audit: type=1400 audit(1549499056.270:30): avc: denied { module_load } for pid=3983 comm="syz-executor2" path="/root/syzkaller-testdir970893794/syzkaller.CqbeWV/39/bus" dev="sda1" ino=16658 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=system permissive=1 00:24:16 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x80, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7) accept$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) syz_emit_ethernet(0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c20000006b00ba0b40281494330f00280000002000000000000000afbd2680afaeb72d821098f783be148f6a535fd1f79bd5428232145e9843a5defadc89bd514a8575d55bb8a59078b6e6cd462fde209a940f6063e448c5a655efd6cd37", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 00:24:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x7, 0x100000000000914, 0x6}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)=0x100000000, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="44010000", @ANYRES16=r2, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x800}, 0x8884) openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x400, 0x2) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f0000000280)) bpf$MAP_CREATE(0x2, &(0x7f0000000180)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x2}, 0x2c) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x412500, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x3, 0x9, 0xfffffffffffffffa, 0x5, 0x0, 0x2, 0x0, 0x0, 0x5, 0xffff, 0x20, 0xfffffffffffffff9, 0x4, 0x3, 0x9d, 0x10001, 0x1, 0x7f, 0x200, 0x0, 0x5, 0x6, 0x5, 0x4, 0x489, 0x53ca85e8, 0xe6, 0x6, 0x400, 0x40000000, 0x7fff, 0x0, 0xa2d, 0x0, 0x3, 0x2, 0x0, 0x3ff, 0x5, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x2, 0x6, 0x5, 0x20, 0x3}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x7) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000140)=0x80000000) 00:24:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f121e0d3f3188a070") setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000140)=[{0x4, 0x0, 0x800007}, {0x58}]}, 0x2fc267b6) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) [ 133.483400] audit: type=1400 audit(1549499056.450:31): avc: denied { map_read map_write } for pid=4010 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 133.516835] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 133.525279] FAT-fs (loop4): Unrecognized mount option "codepage=4³7" or missing value 00:24:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000300)={'team0\x00', 0x43}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000580)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000480)=0x1, 0x4) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x40000000020087, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x1, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x806, 0x0) ioctl(r2, 0xc1, &(0x7f00000004c0)="da7d4b86c2818b75c47f9771d213aedc1cf42145619d6d4f3d64117bf61b5127ad7af6959693156c7711fe75eabf00799280241f1e5aad27d1f3ba517f4aadabeadf5f1953569ed70cee0b91162c85a0e14e7b79821c0ba0b136b09e") io_setup(0x4, &(0x7f0000000080)=0x0) io_getevents(r4, 0x8, 0x34e, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x1c9c380}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042dbd7000fedbdf250d0000001800020004000408080002004000000008000200010000006c06bd06db6747a244a421"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x2004c004) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)=0x200) 00:24:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x34}, 0x8}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0)={@mcast2, 0x0}, &(0x7f0000000200)=0x14) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={r3, @loopback, @multicast1}, 0xfffffffffffffef3) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000380)="4fbd332290d46a995118a92c40041c17eb0050d01e001ab277fb417d5b43c02bc1df9e619caf533fd790ab115e817f1659e2a3dfa3ea5645e1a962eb32d3b70a7d05ab992c043fa883d47c6a35ff5fe7e49f61758ffb28596234a230032e1caded4394858892d1f05c5b1ca665ab7d76d80994dd5ee6a96f013199fd19a6fa64001ea5868bb2a6ea68ac4b94e5c77fd8ddc202373acc5f4c9474b92dd42a42a38583b4543c460e633417a0f671e6c49b5513") prctl$PR_GET_NAME(0x10, &(0x7f0000000280)=""/238) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000005c0)={0x0, 0x0, 0x1, 0x0, [], [{0x1, 0x51, 0x1ff, 0x5, 0x2, 0xed67}, {0x6, 0x80, 0x100, 0x3, 0x0, 0x8}], [[]]}) 00:24:17 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x100, 0x22) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@getaddr={0x14, 0x16, 0x1, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20008000) r1 = socket(0x10, 0x3, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = socket(0x0, 0x4, 0x8ff9) getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000040)={0x2b, 0x1}) ioctl$sock_ifreq(r1, 0x100000089f6, &(0x7f0000000080)={'sit0\x00', @ifru_data=0x0}) ioctl$FICLONE(r1, 0x40049409, r3) 00:24:17 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:17 executing program 3: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000007000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x3}}}}}}, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xc0, r2, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x200}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x88}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x800}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x400}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3b}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x101}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x101}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0xc0}}, 0x1) 00:24:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x3, 0x9e, [], 0x3, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000140)=""/158}, &(0x7f0000000280)=0x78) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:24:17 executing program 5: r0 = socket(0x2, 0x3, 0xff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) sendfile(r1, r1, 0x0, 0xbe5) write$UHID_INPUT(r1, &(0x7f00000000c0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r1, 0x0, 0x400008bca) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000100)="f1", 0x1}], 0x1) 00:24:17 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:17 executing program 0: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) tee(r1, r0, 0x3, 0xf) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e20, 0x7ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}, 0x0, 0x40, 0x0, "c89c23b7d207345bdfcad8b3df4e0001502ac381b677c581887d6d27441e87e97e7434ef82028562c754dc79e6bd116b4a681af0c0fbb2bf3443ec3ec77c0ae49469b499664634bf8166acd09a38f098"}, 0xd8) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 00:24:17 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20020000) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) poll(0x0, 0x0, 0x0) r2 = socket(0x10, 0x100000003, 0x0) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x0, 0x0) [ 134.481741] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 134.494103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 00:24:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000400)=""/56, 0x38}, {0x0}, {&(0x7f00000002c0)=""/152, 0x98}], 0x4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='ne\xd3;0\xc6\x0ex\x02\ator\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='fuseblk\x00', 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r1, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0xfffffc6c) 00:24:17 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write(r0, &(0x7f00000001c0)="c89f5ffdff000000000000e5faff03000034c69e8a81461eef1e2e4501a089d369bf2a07c2baa02930b27f5a63f4265df3c994bf03b7ea6ca8b8a5f4a1ad6d94751a65e479855415e9d8e118", 0x4c) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000080)=""/16, &(0x7f0000000100)=0x10) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[], 0x0) [ 134.639111] SELinux: policydb magic number 0xfd5f9fc8 does not match expected magic number 0xf97cff8c [ 134.677734] SELinux: failed to load policy [ 134.683479] syz-executor0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 134.701272] CPU: 1 PID: 4089 Comm: syz-executor0 Not tainted 4.14.97+ #4 [ 134.708129] Call Trace: [ 134.711132] dump_stack+0xb9/0x10e [ 134.714689] warn_alloc.cold+0x91/0x1ab [ 134.718678] ? zone_watermark_ok_safe+0x250/0x250 [ 134.723525] ? lock_acquire+0x10f/0x380 [ 134.727515] ? avc_has_perm+0x9c/0x350 [ 134.731624] ? avc_has_perm+0x1b7/0x350 [ 134.735609] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 134.740303] ? __vmalloc_node_range+0x390/0x690 [ 134.744979] ? check_preemption_disabled+0x35/0x1f0 [ 134.749998] ? sel_write_load+0x199/0xfb0 [ 134.754152] ? vmalloc+0x60/0x80 [ 134.757527] ? sel_write_load+0x199/0xfb0 [ 134.761693] ? sel_write_load+0x199/0xfb0 [ 134.765854] ? sel_read_bool+0x240/0x240 [ 134.769929] ? trace_hardirqs_on+0x10/0x10 [ 134.774158] ? check_preemption_disabled+0x35/0x1f0 [ 134.779178] ? __vfs_write+0xf9/0x5a0 [ 134.782978] ? sel_read_bool+0x240/0x240 [ 134.787040] ? HARDIRQ_verbose+0x10/0x10 [ 134.791105] ? kernel_read+0x110/0x110 [ 134.795019] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 134.800478] ? rcu_read_lock_sched_held+0x10a/0x130 [ 134.805334] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 134.805502] ? vfs_write+0x17f/0x4d0 [ 134.817162] ? SyS_write+0xc0/0x1a0 [ 134.820796] ? SyS_read+0x1a0/0x1a0 [ 134.824430] ? do_clock_gettime+0xd0/0xd0 [ 134.828587] ? do_syscall_64+0x43/0x4b0 [ 134.832569] ? SyS_read+0x1a0/0x1a0 [ 134.836201] ? do_syscall_64+0x19b/0x4b0 [ 134.840283] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 134.858439] Mem-Info: [ 134.861918] active_anon:82583 inactive_anon:42 isolated_anon:0 [ 134.861918] active_file:4537 inactive_file:16540 isolated_file:0 [ 134.861918] unevictable:0 dirty:1513 writeback:175 unstable:0 [ 134.861918] slab_reclaimable:6786 slab_unreclaimable:57714 00:24:17 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000480)=r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x2, 0x8, 0xa24, 0x8, 0x3, 0x3}, {0x1, 0x59fa, 0x4, 0x8, 0x4, 0x1ff}], [[], [], [], []]}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000140)={0x9, 0x6, 0x9, 0x3, 0xa, 0x8, 0x100000000, 0x3, 0x7, 0x3f, 0x1, 0x3}) ioctl$void(r0, 0x5450) epoll_pwait(0xffffffffffffffff, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0xbc04, &(0x7f00000003c0)={0xa1}, 0x8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x20, 0x4) 00:24:17 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x4, 0x20, 0x1, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x4) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x7ffffffffd, 0x830, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffff9c, 0x0, &(0x7f00000036c0)) [ 134.861918] mapped:58654 shmem:48 pagetables:1418 bounce:0 [ 134.861918] free:1413493 free_pcp:158 free_cma:0 [ 134.898578] Node 0 active_anon:330232kB inactive_anon:168kB active_file:18148kB inactive_file:66760kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234616kB dirty:5252kB writeback:1000kB shmem:192kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 134.930409] FAT-fs (loop4): Unrecognized mount option "codepage=4³7" or missing value [ 134.995180] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 00:24:18 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000140)={'raw\x00'}, &(0x7f00000001c0)=0x54) write(r3, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000040)=""/250, 0xfa) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000000)) [ 135.088378] lowmem_reserve[]: 0 3437 3437 [ 135.114102] Normal free:2554736kB min:5476kB low:8992kB high:12508kB active_anon:330140kB inactive_anon:156kB active_file:17260kB inactive_file:70776kB unevictable:15328kB writepending:6448kB present:4718592kB managed:3521424kB mlocked:15328kB kernel_stack:4128kB pagetables:5652kB bounce:0kB free_pcp:1012kB local_pcp:532kB free_cma:0kB [ 135.219432] lowmem_reserve[]: 0 0 0 [ 135.233392] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB [ 135.252282] Normal: 3519*4kB (UE) 3156*8kB (U) 2352*16kB (UE) 89*32kB (UM) 140*64kB (U) 36*128kB (UME) 12*256kB (UME) 3*512kB (UME) 1*1024kB (M) 0*2048kB 596*4096kB (M) = 2540220kB [ 135.269696] 25407 total pagecache pages [ 135.274922] 0 pages in swap cache [ 135.278602] Swap cache stats: add 0, delete 0, find 0/0 [ 135.284626] Free swap = 0kB [ 135.287865] Total swap = 0kB [ 135.291859] 1965979 pages RAM [ 135.295208] 0 pages HighMem/MovableOnly [ 135.299420] 315705 pages reserved [ 135.307776] SELinux: policydb magic number 0xfd5f9fc8 does not match expected magic number 0xf97cff8c [ 135.345606] SELinux: failed to load policy [ 135.365028] syz-executor0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 135.382922] CPU: 0 PID: 4119 Comm: syz-executor0 Not tainted 4.14.97+ #4 [ 135.389769] Call Trace: [ 135.392382] dump_stack+0xb9/0x10e [ 135.395932] warn_alloc.cold+0x91/0x1ab [ 135.399907] ? zone_watermark_ok_safe+0x250/0x250 [ 135.404746] ? lock_acquire+0x10f/0x380 [ 135.408726] ? avc_has_perm+0x9c/0x350 [ 135.412623] ? avc_has_perm+0x1b7/0x350 [ 135.416605] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 135.421281] ? __vmalloc_node_range+0x390/0x690 [ 135.425944] ? trace_hardirqs_on+0x10/0x10 [ 135.430173] ? check_preemption_disabled+0x35/0x1f0 [ 135.435193] ? sel_write_load+0x199/0xfb0 [ 135.439344] ? vmalloc+0x60/0x80 [ 135.442737] ? sel_write_load+0x199/0xfb0 [ 135.446882] ? sel_write_load+0x199/0xfb0 [ 135.451046] ? __mutex_lock+0x829/0x1430 [ 135.455108] ? sel_read_bool+0x240/0x240 [ 135.459182] ? trace_hardirqs_on+0x10/0x10 [ 135.463421] ? check_preemption_disabled+0x35/0x1f0 [ 135.468449] ? __vfs_write+0xf9/0x5a0 [ 135.472253] ? sel_read_bool+0x240/0x240 [ 135.476332] ? HARDIRQ_verbose+0x10/0x10 [ 135.480411] ? kernel_read+0x110/0x110 [ 135.484329] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 135.489786] ? rcu_read_lock_sched_held+0x10a/0x130 [ 135.494819] ? vfs_write+0x17f/0x4d0 [ 135.498540] ? SyS_write+0xc0/0x1a0 [ 135.502184] ? SyS_read+0x1a0/0x1a0 [ 135.505812] ? do_clock_gettime+0xd0/0xd0 [ 135.509961] ? do_syscall_64+0x43/0x4b0 [ 135.513935] ? SyS_read+0x1a0/0x1a0 [ 135.517586] ? do_syscall_64+0x19b/0x4b0 [ 135.521658] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 00:24:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff001, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="6b3c906d6b66732e666174001204010002000270fff8", 0x16}], 0x0, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f00000003c0)=@alg, &(0x7f0000000440)=0x80) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x40000, 0x0) write$P9_RSTAT(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3f0000007d020000003800e00805000000080300f7000500000000000000000000800400000009000000000800000000000005007666617400000000000000fbc455098d5c927d20fc3b377158d50edb442bc0855cc7c67c073c6d940a3a8fc932ce7bfbed2ccee26a605e5f2ed3b01174e1e6561f0d7863d1f2b9547ab8476924e8aead6f684ad5bdb31ff6d16cd0559a62d6a1b7b2684ea2b95927059374ad8588333f40006f628c81b510bce669be164ce6753493dbea4ce92356256f165c7e42"], 0x3f) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0x2, "dcd53b891d61860f54805e3429a2e57a2cf60ea7"}, 0x16, 0x1) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000380)=@v1={0x2, "be2ce23114b037c86ccc5f"}, 0xc, 0x2) 00:24:18 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:18 executing program 0: r0 = epoll_create(0x401) r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000140)={0xfffffffffffffffc}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000d5dff4)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r2, &(0x7f0000000080)='fdinfo/4\x00') 00:24:18 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) r4 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x22) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) fsetxattr$security_capability(r1, &(0x7f0000000440)='security.capability\x00', &(0x7f0000000480)=@v2={0x2000000, [{0x200, 0x8001}, {0x2}]}, 0x14, 0x2) getpeername$netlink(r2, &(0x7f0000000100), &(0x7f0000000380)=0xc) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000300), &(0x7f0000000340)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f00000001c0)={0x5, 0x0, 0x3, 0x1a6a20f1}) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() pipe(&(0x7f00000003c0)) fchown(r3, r7, r8) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000400)={0xff, 0x80, 0x69f5, 0x8, 0x8, 0x6, 0x2}) 00:24:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8003, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x140, 0x4) mprotect(&(0x7f0000e69000/0x4000)=nil, 0x4000, 0x300000d) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) ioctl$sock_SIOCSPGRP(r1, 0x8902, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) add_key$keyring(0x0, &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0xba) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0), 0x4) syz_open_dev$loop(0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x80001000) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000500)=""/142) socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 135.727936] audit: type=1400 audit(1549499058.690:32): avc: denied { block_suspend } for pid=4129 comm="syz-executor0" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:24:18 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203243bbab801376f8c2a1349c5de00"], 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYRES32=r1], 0x4}}, 0x0) [ 136.049792] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:19 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x7fffe, 0x0) setxattr(&(0x7f0000000240)='\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='uer.]eth1\x00'], &(0x7f00000002c0)='\x00', 0x1, 0x3) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x6, &(0x7f0000000040)=']eth1\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x5, 0x1f, 0x0, 0x80, 0x0, 0x2000000000000000, 0xc, 0x5, 0x40, 0x81, 0xffffffff, 0x0, 0x40, 0xbea, 0xea75a41, 0x4, 0x7ff, 0x9, 0x1f, 0xfffffffffffffffd, 0x7, 0x80000000, 0xfffffffffffffffe, 0x8000, 0xffffffffffffff73, 0x8, 0x8, 0xf1, 0x100, 0x200000000000, 0xfffffffffffffffc, 0x4, 0x7, 0x6, 0x7fff, 0x3f9ababe, 0x0, 0xff, 0x2, @perf_config_ext={0xb3, 0x58234b3c}, 0x4, 0x10001, 0xf02c, 0xf, 0x1ff, 0x8, 0x89e1}, r1, 0x4, r0, 0x9) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x872a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 00:24:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xffffffffffffffff, 0x1) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x7fe, 0x2) ioctl(r0, 0x8912, &(0x7f00000018c0)="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") rmdir(&(0x7f0000000580)='./bus\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) mkdir(&(0x7f0000000680)='./bus\x00', 0x22) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000440)={0x2}, 0x8) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000fc0)="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") r5 = socket$inet6(0xa, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(r3, &(0x7f00000007c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./bus\x00', 0xffffffffffffff69, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xfe, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000004c0)={0x5, 0xfff, 0x5, 0x100000000, 0x40001}) socket$inet6(0xa, 0xa, 0x3ff) clock_nanosleep(0x7, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'ip6gre0\x00', @remote}) sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) [ 136.225498] FAT-fs (loop4): bogus logical sector size 4608 [ 136.234455] FAT-fs (loop4): Can't find a valid FAT filesystem [ 136.348118] FAT-fs (loop4): bogus logical sector size 4608 [ 136.354006] EXT4-fs (sda1): re-mounted. Opts: [ 136.366334] FAT-fs (loop4): Can't find a valid FAT filesystem 00:24:19 executing program 4: mount(&(0x7f0000000080)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='dax\x00', 0x8, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x2, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2800000018000000290000003b0000002b02df2fd0846bc09671b2cf01203998f7e5cf3eb30735bb7b85ee85001066f2ba24bd33"], 0x28}}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) 00:24:19 executing program 0: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f0000001340)={'system_u:object_r:shell_exec_t:s0', 0x20, 'system_u:object_r:hald_var_run_t:s0', 0x20, 0x0, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x80) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="1a846a5c17ed47fbdebbdf47cdc27841d793e3312e6b74743e57b4780264640fedfec17fd6f537429e709e8505c094a649414622d8acec3a746cfc3cbe0d9094d6a9c7ab607ad18ede87fcef285f310ff830e2e477f9d260d9e9e9af86109dff10f35eff0ed8e49cca01d095f9d0e8711470c28d7390bfdbfffc16c7abadfac054cd09092f9d4f9b3b19b51261768cb7ad797e566b4098f37eba6c002c96742cfdcbd057487cb39833f5e87bf7d78131f620c7b517427e6858b0bba586d0312e6ae9540caff93a42c1999384c38402342743f300fcbc6d0f5087ea13c25bb6ebe63164e096d5642848fcd8e27178a20e279818aa50a8", 0xf6, 0xfffffffffffffffa) keyctl$link(0x8, r1, r2) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) accept$unix(r3, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e) [ 136.534497] audit: type=1400 audit(1549499059.500:33): avc: denied { validate_trans } for pid=4179 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 00:24:20 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xffffffffffffffff, 0x1) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x7fe, 0x2) ioctl(r0, 0x8912, &(0x7f00000018c0)="025cc83d6d345f9b722030c7da1faf4e2f6b5be9503c41c99784c24ecb6ab59e791ab4b2fa417f51ed4640ef3174a488b20dc1f09ae150b51cb9251070cf6d576e7bf0a332e74d5af3bf9a5eb3ea1e8de7f1abe9fb64d72de1b486c906055ca3f67509f99fad4664a753a2c9e0b8f4983ae97536b6599612abe7a4a6d9c069090000003b1a92dddbd54621e2f98e761a2e832f8196d934977b54f8ad0294e6ba8426b09efcbf9c07f5b57f067c52939262e6b6b44b541925acb4e4e3bf39dec69a42b147f3e9a708af955927eee0ce3c76db19b625e04dd9540fe85f451a0fb5e0dd53bc1175f8c137a92466a7531635b630b0c4cc5d8daf9f95264c0e4ea25623b6a216638cb86879ccc995f285222768c9ec4adc22e794ec44fa65179bf642fc4d6ffdbdef603af698dc0b85f0d1598312a913c5c848ff573c45727c1b64b081b7b36791d95aff2e202799b2a2626999c4a28a16b68709af81fa832c8f11e2b99a3191d0a3ea556331bfb79658bbe731ff2dfca159050000008a0bc7348876383502f1f1e3f162f966b6b7b06668e0b056f4b89fcfc0553ef31e372a1067a2547a00000000714e42effe38f8b9d6a6ebcf0800000000000000bad06d551cb9bd9024c22d82effeac7cfb44938d168f8dacb3f1136604352a0729cd9ea90d6fc8336c69756c200c5c25f079a3b57bea45371e535e9830d70c669a5b382ba5371ab09ce625caef6a653566d5381bdce4d469d0db793d5c805c3a5888ce7ee572b1d8d70cf98f401d2e16fde9fdbf7c7aa5a9853e93f25b1262c15048d0755659e997b4c3d470f0536b8aed4e3d309f08338ee8958408011b30dc030d43206f4e1a5955cb470c2586ef27738fa01c6684cd06cc92511df59b8e406f4654cb7a9e01e004ffe92e84f2dc4eaff99b4f38cd47cd9fe78c484f1e50d7d5b9bc1e6974a3ab6c644bc3c8312e3a603cc334f05f6a05830d6a36318578d70192f3c4e7167ceb01d74b85d00b2cf3d2309f19a776eb38ecf707f8c161a4a4289c1e6dc350a587297aeb65e2588cde47b95f725ba7aa947a4848") rmdir(&(0x7f0000000580)='./bus\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) mkdir(&(0x7f0000000680)='./bus\x00', 0x22) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000440)={0x2}, 0x8) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000fc0)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96892a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195c1388861be8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53e6aaf4f2dec9ddfb4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c178bce65ed205154ab4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r5 = socket$inet6(0xa, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(r3, &(0x7f00000007c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./bus\x00', 0xffffffffffffff69, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xfe, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000004c0)={0x5, 0xfff, 0x5, 0x100000000, 0x40001}) socket$inet6(0xa, 0xa, 0x3ff) clock_nanosleep(0x7, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'ip6gre0\x00', @remote}) sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 00:24:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3ffffffffffffffc, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) shutdown(r0, 0x1) 00:24:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xffffffffffffffff, 0x1) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x7fe, 0x2) ioctl(r0, 0x8912, &(0x7f00000018c0)="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") rmdir(&(0x7f0000000580)='./bus\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) mkdir(&(0x7f0000000680)='./bus\x00', 0x22) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000440)={0x2}, 0x8) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000fc0)="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") r5 = socket$inet6(0xa, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(r3, &(0x7f00000007c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./bus\x00', 0xffffffffffffff69, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xfe, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000004c0)={0x5, 0xfff, 0x5, 0x100000000, 0x40001}) socket$inet6(0xa, 0xa, 0x3ff) clock_nanosleep(0x7, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'ip6gre0\x00', @remote}) sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 00:24:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xffffffffffffffff, 0x1) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x7fe, 0x2) ioctl(r0, 0x8912, &(0x7f00000018c0)="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") rmdir(&(0x7f0000000580)='./bus\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) mkdir(&(0x7f0000000680)='./bus\x00', 0x22) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000440)={0x2}, 0x8) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000fc0)="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") r5 = socket$inet6(0xa, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(r3, &(0x7f00000007c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./bus\x00', 0xffffffffffffff69, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xfe, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000004c0)={0x5, 0xfff, 0x5, 0x100000000, 0x40001}) socket$inet6(0xa, 0xa, 0x3ff) clock_nanosleep(0x7, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'ip6gre0\x00', @remote}) sendfile(r5, r6, &(0x7f00000000c0)=0x202, 0x5a) 00:24:20 executing program 5: socket$inet6(0xa, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x2, 0x7, 0xfffffffffffffffc, 0xf, 0xa, 0x0, 0x70bd2b, 0x25dfdbff, [@sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bb0, 0x40, {0x6, 0x33, 0x5, 0x7fffffff, 0x0, 0x0, 0x0, @in=@rand_addr=0x7, @in6=@rand_addr="94290875c0b031a98ed1116c2929fb1f"}}]}, 0x50}}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000000)=0x3, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000600)={&(0x7f0000000400)={0xc4, r6, 0x1, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fff}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4854e72f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8004}, 0x841) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$VT_WAITACTIVE(r3, 0x5607) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000500)) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000240)=0x0) fcntl$setown(r4, 0x8, r7) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x3) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000008000)="4c0000001200ff308b095ffefd956fa283b724a6008c00000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b07", 0x4c}], 0x1}, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) openat(r8, &(0x7f0000000080)='./file0\x00', 0x2000, 0x100) 00:24:20 executing program 3: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000440)='\x01\x00\x00\x00\x00\x00\x01\x00\xf4\xd4Y\a\x8e\x02\x00\x00\x00\x00\x00\x00\x00\xb0\xa1\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005b4000/0x2000)=nil, 0x2000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x9, 0x3, 0x1800000000000000}}) r4 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@gettaction={0x18, 0x32, 0x901, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4, 0x2}]}, 0x18}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x1000008, 0x33, r2, 0x2) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000400)='./bus\x00', 0x80004, 0x1c1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r7) getsockopt$inet_tcp_buf(r7, 0x6, 0x21, &(0x7f0000000b00)=""/4096, &(0x7f0000000240)=0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r9 = creat(&(0x7f0000000280)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x4) ftruncate(r9, 0x2008200) open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) 00:24:20 executing program 0: socket(0x10, 0x0, 0xc) unlinkat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(0x0, 0xbdb626b3, 0x0, 0x0, 0x338) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0xa0140100, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x1, 0x4) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 00:24:20 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x400000) unshare(0x0) ioctl$RTC_AIE_ON(r1, 0x7001) r2 = inotify_add_watch(r0, &(0x7f0000000140)='./file0/file0\x00', 0x8) inotify_rm_watch(r1, r2) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x5004, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) 00:24:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1f) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x90, r1, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xc362}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80b2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000340)=@getlink={0x2c, 0x12, 0x60d, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x4}]}, 0x2c}}, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x800, 0x4}) 00:24:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2000203a, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) dup3(r1, r0, 0x80000) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000000)) write$eventfd(r1, 0x0, 0x266) [ 137.262917] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:20 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) [ 137.481416] device lo entered promiscuous mode [ 137.719988] Y­4`Ò˜: renamed from lo 00:24:20 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:20 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x220000, 0x8) sendto$unix(r0, &(0x7f0000000240)="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", 0x1000, 0x11, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) dup(r0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400000000000, 0x8000000000) lseek(r1, 0x0, 0x2) 00:24:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x3e8, 0x318, 0x0, 0x110, 0x110, 0x0, 0x318, 0x318, 0x318, 0x318, 0x318, 0x4, &(0x7f0000000040), {[{{@ipv6={@ipv4={[], [], @local}, @ipv4={[], [], @rand_addr=0x1f}, [0xff0000ff, 0x0, 0xffffffff, 0xffffffff], [0xff000000, 0xff000000, 0xffffffff, 0xff000000], 'veth1_to_bond\x00', 'veth1_to_team\x00', {}, {0xff}, 0x8, 0xfa, 0x4, 0x54}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'teql0\x00', 0x3}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @broadcast}, [0xffffffff, 0xffffffff, 0x0, 0xffffff00], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 'batadv0\x00', 'veth1_to_hsr\x00', {0x57b04366dfdcbae3}, {0xff}, 0x87, 0x8, 0x5, 0x20}, 0x0, 0xc8, 0xf0}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x200, 0x1, 0x2}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x80, 0x1, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xe}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x448) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x1}, 0x20) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace(0x8, r3) fcntl$setstatus(r0, 0x4, 0x42803) 00:24:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = socket$inet(0x10, 0x3, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000000c0)=0x4) mknodat(r2, &(0x7f0000000080)='./file0\x00', 0x800, 0x4b06) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000320007031dfffd946fa2830020200a0009000300741d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 137.918680] tc_dump_action: action bad kind 00:24:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x2000000000000, 0x2, @local, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r1, &(0x7f0000000300)=[{{&(0x7f0000000840)=@rc, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200), 0xfffffffffffffc40}, {&(0x7f0000000240)=""/22, 0x16}, {&(0x7f0000000280)=""/5, 0x5}, {&(0x7f00000008c0)=""/4096, 0x11e5}], 0x1103}}], 0x31a, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x215) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3ffffffffffff03, 0x0) [ 137.940290] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 137.967732] tc_dump_action: action bad kind [ 137.977831] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 138.024692] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mounts\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:24:21 executing program 3: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000440)='\x01\x00\x00\x00\x00\x00\x01\x00\xf4\xd4Y\a\x8e\x02\x00\x00\x00\x00\x00\x00\x00\xb0\xa1\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005b4000/0x2000)=nil, 0x2000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x9, 0x3, 0x1800000000000000}}) r4 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@gettaction={0x18, 0x32, 0x901, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4, 0x2}]}, 0x18}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x1000008, 0x33, r2, 0x2) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000400)='./bus\x00', 0x80004, 0x1c1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r7) getsockopt$inet_tcp_buf(r7, 0x6, 0x21, &(0x7f0000000b00)=""/4096, &(0x7f0000000240)=0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r9 = creat(&(0x7f0000000280)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x4) ftruncate(r9, 0x2008200) open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) 00:24:21 executing program 2: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x9, 0x12, 0x20, 0x1, "1cee3e86caebb347afb40f7c2b1937ce57a7ca3846918a577d964d0e70791315510a8c3da8086d7db45acade4a5593f700ad81fac2d0047cfe448be0f791459b", "ecbd32342a46a2036a1a7c1f004684cdadbc61f4d7fc81423aaae24042bf0512", [0x20, 0x65]}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffaf) r4 = socket$inet(0x2, 0x3, 0x1) write$selinux_context(r1, &(0x7f0000000000)='system_u:object_r:setrans_exec_t:s0\x00', 0x24) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x810005, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 00:24:21 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x28, &(0x7f0000000000)='vmnet0/#,keyringmime_type.GPL-em0@wlan0\x00'}, 0x30) r1 = getpgrp(0xffffffffffffffff) tgkill(r1, r1, 0x36) r2 = getpgrp(0x0) wait4(r2, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x1, r1}) 00:24:21 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fadvise64(r0, 0x0, 0x4, 0x1) fcntl$setstatus(r0, 0x4, 0x42803) 00:24:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000040)=""/245, 0xf5}, {&(0x7f0000000280)=""/90, 0x5a}, {&(0x7f0000000140)=""/25, 0x19}], 0x4, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') preadv(r1, &(0x7f0000000480), 0x2000000000000113, 0x0) 00:24:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000180)=@known='trusted.overlay.opaque\x00') r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x20a40, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="50593193e7784337c7e3a08d125ab003c48a78ba89fa5c5afb58f81241a593ab6a9e859691fc0b2925daee2cd7ef3bafb31fb641d265ec73c2d7b70fbdcafd032f230a4effe1faaf731671b7e89802aed610e5d167f9858f7a959a7dc5026bc34fb5a07418c4c2473f6d968f700c776567a15d6b", 0x74, 0x6}, {&(0x7f0000000240)="57846841afc63512b7e8e27b9d5d88018f7afd447f21c4f4ffc141e9e1e26cdaf687768e89f5f4e4052398348c5c89ee2efff6bc45b32e5fedc6cd69c45cc8beb5d4eaa100bda731cd3da61c0dc983313401a8cbf05787bbab7a62b55b85c8a22a6c98751996e71edc1fb2f34962c36e9d58cec6a56cccec61defb9fc0212a7ad8cce3b159baaac8dea18bfb972b376c5d3e9ce4870e900bc3c9a7415ad1415e81c56e660d0ca11f0768df339685ae36dfdef1156237ce433f97e8823648bab06e127705", 0xc4, 0x8}, {&(0x7f0000000340)="e4093eb2c475d071bdbca829996e84275b0349946f85f6e4a003d6971436f33e790da6d5eb606ab7aef0c2b3e8beec06e3afc2d3617fc9e1963cc47cf534c333712daa0e5443432d22af1ea905d2b581f8b4ee91e94c47251b940ce3a389ec33ac30084924bddfdc2a6d672b011042ad2b3fdd9cc136095ce6b1", 0x7a, 0x7}], 0x280000, &(0x7f0000000500)={[{@nodiscard='nodiscard'}, {@nodiscard='nodiscard'}, {@fastboot='fastboot'}, {@alloc_mode_reuse='alloc_mode=reuse'}], [{@fowner_lt={'fowner<', r2}}, {@dont_hash='dont_hash'}, {@hash='hash'}]}) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') [ 138.376622] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:21 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) [ 138.568337] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:23 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x280000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x1) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x80000000, 0xd303, 0x0, 0x0, 0xffff, 0x40000, 0x0, 0x10000, 0x7, 0xfffffffffffffff9, 0x9, 0x6, 0x8, 0x1, 0xa19, 0x6, 0xe6, 0xfffffffffffffff9, 0x4, 0x7fffffff, 0x9, 0x10001, 0x7, 0x20, 0x5, 0x2, 0x6, 0x1, 0x9, 0x3003, 0x7, 0x8, 0x2, 0x4, 0x80, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x2, 0x8, 0x9, 0x4, 0x6, 0x8000, 0x2}, r2, 0xc, r3, 0xb) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r4, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:24:23 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x2, 0xff, 0x0, 0x0, 0x0, 0x10000}, 0x20) 00:24:23 executing program 5: socketpair$unix(0x1, 0x20000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) vmsplice(r2, &(0x7f0000001500)=[{&(0x7f00000013c0), 0xfffffd90}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d80)=@broute={'broute\x00', 0x20, 0x7, 0x850, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000080), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x20, 0xedff, 'nr0\x00', 'gre0\x00', 'hwsim0\x00', 'teql0\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="f9afba2e42e4", [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0x70, 0xe8, 0x130}, [@common=@ERROR={'ERROR\x00', 0x20, {"81e6c85f23e7ea2281e0a6e8658e4f519e314f9875669fe72d05fe63188f"}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x7}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x101, 0x1, 0xffffffff}}}}, {{{0x7, 0xa, 0x8906, 'veth0_to_bond\x00', 'vcan0\x00', 'veth1_to_hsr\x00', 'hsr0\x00', @broadcast, [0xff, 0x0, 0x0, 0xff], @link_local, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x2, 0x88cb, 'nr0\x00', 'ip6gretap0\x00', '\x00', 'veth0_to_team\x00', @dev={[], 0x2a}, [0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0xa8, 0xa8, 0xd8, [@realm={'realm\x00', 0x10, {{0x10001, 0x20}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{{{0x9, 0x40, 0x8884, 'vxcan1\x00', 'gre0\x00', 'ip6gre0\x00', 'team0\x00', @dev={[], 0xc}, [0x0, 0xff, 0x0, 0xff], @random="6c71427eb9e5", [0x0, 0xff, 0xff], 0xa8, 0xa8, 0xf0, [@realm={'realm\x00', 0x10, {{0x1, 0x7f, 0x1}}}]}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x0, 0x6, 0x6b}}}}, {{{0x3, 0x9, 0x2af0, 'bcsh0\x00', 'bond0\x00', 'veth1\x00', 'ifb0\x00', @dev={[], 0x25}, [0xff, 0xff, 0x0, 0xff], @dev={[], 0xe}, [0xff, 0x0, 0xff, 0x0, 0xff], 0x70, 0xf0, 0x120}, [@common=@log={'log\x00', 0x28, {{0x3, "8d3c3230c2b0c98afd2095227e77583b89b6da1e3baf627eecf4660dc612"}}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff, 0x2, [{{{0x0, 0x2, 0x7, 'veth0\x00', 'veth0_to_bridge\x00', 'team_slave_1\x00', 'ip6gre0\x00', @dev={[], 0x1a}, [0xff, 0xff, 0x0, 0xff], @dev={[], 0x1c}, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], 0xb0, 0x130, 0x180, [@owner={'owner\x00', 0x18, {{r4, r5, r6, r7, 0x1, 0x1}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x80c9, 0x10001}}}]}, @common=@log={'log\x00', 0x28, {{0x1, "e8b3eb1ba00b840605f6e41f721ea7d782e2d4bed693f71da90daad8c899", 0x3}}}}, {{{0x3, 0x1, 0x0, 'vlan0\x00', 'nr0\x00', 'veth1_to_bridge\x00', '\x00', @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff], @random="81615c530834", [0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0xe0, 0x158, [@devgroup={'devgroup\x00', 0x18, {{0x2, 0x9, 0xed7, 0x2, 0x2}}}, @cpu={'cpu\x00', 0x8, {{0x34}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0xffff, 0x5, 0x0, 0x0, "50a756b1f76927e2303b6fe098f7222f8c0a5ef2bef6a9039e21725f99a7e42f30801032b6739d253f6cf327baa424128c7b25630e3ba0008dc4b601bea01ae1"}}}}]}]}, 0x8c8) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 00:24:23 executing program 3: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000440)='\x01\x00\x00\x00\x00\x00\x01\x00\xf4\xd4Y\a\x8e\x02\x00\x00\x00\x00\x00\x00\x00\xb0\xa1\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005b4000/0x2000)=nil, 0x2000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x9, 0x3, 0x1800000000000000}}) r4 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@gettaction={0x18, 0x32, 0x901, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4, 0x2}]}, 0x18}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x1000008, 0x33, r2, 0x2) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000400)='./bus\x00', 0x80004, 0x1c1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r7) getsockopt$inet_tcp_buf(r7, 0x6, 0x21, &(0x7f0000000b00)=""/4096, &(0x7f0000000240)=0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r9 = creat(&(0x7f0000000280)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x4) ftruncate(r9, 0x2008200) open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) 00:24:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x8, &(0x7f0000000100)='cpuset/\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, r1, 0x0, 0x2, &(0x7f00000000c0)='(\x00', r3}, 0x30) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000200)) write$P9_RREADDIR(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) 00:24:23 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x7, 0x100000000000914, 0x6}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000180)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x2}, 0x2c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000100)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x20002, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x38, 0x4, 0x3, 0x16, 0x7, 0x200, 0x3, 0xc9, 0xffffffffffffffff}) r3 = accept$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0xffffffffffffff64) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)="aed648c6c52d2251fa2d", 0xa) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000200)={0x20000000}) openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x181000, 0x0) 00:24:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x200000000000010a, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x23}]}, &(0x7f0000000240)='GPL\x00', 0xd5, 0xfcb1, &(0x7f0000000380)=""/251}, 0x48) 00:24:23 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000000)={0x5c49f8a3, 0x1, 0x88, 0x81, 0xffffffffffff8000, 0x5}) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) 00:24:23 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x18200, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0x2}, 0x251) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000700)={'lo\x00', {0x2, 0x4e21, @multicast1}}) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000600)={0x0, 0x0, 0x1, 0x0, [], [{0x3ff, 0x77e, 0x101, 0x3f, 0x8, 0x20}, {0x8, 0xfecf, 0xff, 0x5, 0x9, 0x80000000}], [[]]}) sendmsg$nl_netfilter(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x23c, 0xa, 0x6, 0x20, 0x70bd29, 0x25dfdbfb, {0x7, 0x0, 0x6}, [@nested={0x228, 0x4a, [@generic="f98786f40a1851bf02881c9c329b772c0795fe6a39d3af829e85b0fa", @generic="6f9e79f4cd5ae2de270e13a4b5fa5c05254001c47742fc3ca1d6581219732fe4497f6af2a2b86bc967d5eb60001ed6e34023647b19566f909d011a45f6b5b548e37bab1c43b58884f17bd451d80d8a78b11a6b249cebbf340720788eb4c473315b3138e3187fa294671b1e9aeb6ddb99e9", @generic="37b49ac77c975e19d4e7ccb6541f33da969e29ee29f3e86b7d4d3bc08707f5769575f505cabe15759f7520f0300676e42b6926024a3944ae7a0a53f71d41e43cfba84c76e230ba8df2d9edec190e93827ef58bc2b1e2a10249ae3120af060059c8da03e2b84c3384be93ed49880b325256e60e11b0d56e41c5a22c138ea66834ca536c39cf7eb9b9448e5b82b5158fa725", @generic="67752e00b7975833c3b70da8ae93a71992b6e04ab051d4", @generic="e9bab9d441d75953c133767fc9157678fa434e554f8d8684c9f1ec1bd3cf0a26888422ba36270512e6f18b9cc718309635c916e280c2a06d63cbad0e58db358836fe0be1072611d66bf8b206bfe3a45422a1146df763f4bff630c72b43f9a93f240722ec7f416f9bad36202260e3f4085e549a9c22e8b51d8926be08279e2c56eaee267aa99f1283d5e4bd9358d2398a5a3bab7f0b15de0ad4cd6ef35f8acdfdde21b498f46c3a32120da4184e2d49bcd8f9cf069cf2c695c6b0d48e2c793adb3e68bcb1f0ba3d8b3a4e4af7c353be5043d93dc8799bd7d00c0872d4f36c2180d2f4cb3ec91269fc0b674eda56fbd4"]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r2, 0x40047459, &(0x7f0000000240)=""/174) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000000)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="1b7ce7f65b354a51bdd61c93e6451c66dccf4a802451fb6f73f9f068305578c16058db122c3fd61e1055523391b5caa7a71f16d8074e78163eb43e21bf0583bfc7f3953e528ad9626ccee3f8b0e534a90cb817cf47f3e3b1485954c4c653a2efdbbf9b89c0795537d6e09c3d789c4c1fc350e15316b65bd2ee1ac6392f667425743f5ca2ca654d87a66704"], 0x0) 00:24:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) fremovexattr(r0, &(0x7f0000000240)=@known='trusted.overlay.metacopy\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x4, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0xc0, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f00000002c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3ff) r3 = socket(0x1b, 0x801, 0xe33) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000100)={0x2, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e21, @remote}}}, 0x108) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000440)={0x5, {{0x2, 0x4e21, @rand_addr=0x9}}, 0x1, 0x1fffffffffffdb6, [{{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}, {{0x2, 0x4e24, @remote}}]}, 0xce3a4a7d) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000080)) fcntl$setflags(r4, 0x2, 0x1) 00:24:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000003c0)={'nat\x00', 0x0, 0x3, 0x17, [], 0x2, &(0x7f0000000280)=[{}, {}], &(0x7f0000000380)=""/23}, &(0x7f0000000440)=0x78) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x10f}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020100021000000000000000000000000800130004000300fb0000000000000006000000000000000000800000000000e000000100000000000004000000000000000000001381a8b2025491cf82e0b2b10832272d6d0000000000001f0000170003000600000000000200000490cf7ced00000000000000000300050000f3ff000200423b1d632b01002000000000000094693b8489e4c081c7551c70"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'bond_slave_1\x00', 0x2400}) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0x81) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') recvfrom(r2, &(0x7f0000000480)=""/73, 0x49, 0x40000000, &(0x7f0000000500)=@nfc_llcp={0x27, 0x1, 0x1, 0x0, 0x9, 0x80000001, "7399b116c14a7bdf9cc5392c81b750f5d70d968869e40e065197401f8b62e864e59ae20dd50c81854c52a26f48deaf7c4a839e901cf41b055e814ca0fcc2b9", 0x3e}, 0x80) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000580)={0x2, 0x70, 0x12a1, 0x7, 0x1, 0x400, 0x0, 0x1, 0x80022, 0x8, 0x100, 0xffffffffffff893c, 0x100000000, 0x6, 0x2, 0x81b, 0x1, 0x6, 0x7, 0xa87, 0xeb2, 0x80000001, 0x3, 0x24e83aa, 0xff, 0x7, 0x9, 0xae, 0x3c, 0x4, 0x7a, 0xa27, 0x5, 0x7, 0x101, 0x401, 0x100000001, 0x2, 0x0, 0x150a, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x1400, 0x8, 0x8, 0xf, 0x9, 0x1, 0x8001}) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000200)=0x3) 00:24:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'veth0_to_bond\x00', 0x8000}) listen(r0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 00:24:24 executing program 5: r0 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) r1 = syz_genetlink_get_family_id$tipc(0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000280)={r3, r4/1000+30000}, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r1, 0x100, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) keyctl$unlink(0x9, r0, r0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="bdfff81c", @ANYRES16=r5, @ANYBLOB="000127bd7000fedbdf25010000000800060003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x24000001) [ 141.105972] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000180)) syz_open_pts(r1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000480)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f00000005c0)=r4) getsockopt(r0, 0x7f80000000000000, 0x6, &(0x7f0000000600)=""/4096, &(0x7f0000001600)=0x1000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futex(&(0x7f0000000100), 0x0, 0x2, &(0x7f00000003c0)={r6, r7+30000000}, &(0x7f0000000400)=0x2, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x0, 0x100000000, 0x0, "0acd8befa5a228d2e8db47a7ba31cc9532e9a852f6ab1e9bc3d60602abee60caa7105ae4802e03276787af64b23e4e7db2840746d55898f4a39125ade8d12548812d17e45e35ceb6c32ea9909b14891c"}, 0xd8) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clock_getres(0x4, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000080)) [ 141.236516] audit: type=1400 audit(1549499064.200:34): avc: denied { setopt } for pid=4407 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:24:24 executing program 3: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000440)='\x01\x00\x00\x00\x00\x00\x01\x00\xf4\xd4Y\a\x8e\x02\x00\x00\x00\x00\x00\x00\x00\xb0\xa1\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005b4000/0x2000)=nil, 0x2000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x9, 0x3, 0x1800000000000000}}) r4 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@gettaction={0x18, 0x32, 0x901, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4, 0x2}]}, 0x18}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x1000008, 0x33, r2, 0x2) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000400)='./bus\x00', 0x80004, 0x1c1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r7) getsockopt$inet_tcp_buf(r7, 0x6, 0x21, &(0x7f0000000b00)=""/4096, &(0x7f0000000240)=0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r9 = creat(&(0x7f0000000280)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x4) ftruncate(r9, 0x2008200) open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) 00:24:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x1, 0x0, 0x0) r1 = dup(r0) write$UHID_CREATE2(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) 00:24:24 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:24 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000e40)) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000e80)={@local, @remote}, &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f40)={{{@in6=@initdev, @in6=@remote}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000015c0)) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000001600)={'team0\x00'}) getpeername$packet(r2, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(r0, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14) write$P9_RRENAME(r1, &(0x7f0000000180)={0x7, 0x15, 0x2}, 0x7) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000001b40)={@broadcast, @initdev}, &(0x7f0000001b80)=0xc) getpeername$packet(r1, &(0x7f0000001e00), &(0x7f0000001e40)=0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r3, &(0x7f0000000080), 0x1c) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sendmmsg(r3, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 00:24:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0x1, 0x9, 0xff, 0x0, 0xb34a, 0x40, 0x5, 0xe16, 0x0, 0xf58, 0x7fff, 0x2, 0x9, 0x7, 0xffac6a2, 0x1ff, 0x20, 0x401, 0x20, 0x7185395f, 0x7, 0x53, 0x10000, 0x6, 0x1, 0x1000, 0x40, 0x2, 0xfff, 0x3ff, 0x1, 0x1, 0x1000, 0x9, 0x101, 0x0, 0x7fff, 0x4, @perf_config_ext={0x2, 0x80000001}, 0x10100, 0x20, 0x6, 0x4, 0x6b6b, 0xe2, 0xde}, r1, 0x5, 0xffffffffffffff9c, 0x4) getsockopt$packet_int(r0, 0x107, 0xb, 0x0, &(0x7f0000000040)) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000001c0)={0x0, {{0xa, 0x81, 0x9, @mcast1, 0x100000000}}}, 0x88) getsockopt$packet_int(r0, 0x107, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)='bcsh0\x00') 00:24:24 executing program 0: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0xfd, r2, 0x1, 0x0, 0x6, @local}, 0x14) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r1, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x8, 0x9c66}, {0x1ff, 0x5}], r3}, 0xfffffffffffffd3a, 0x2) sendto$inet6(r0, &(0x7f00000002c0)="030400000300600000000000fff55b4202938207d9fb3780398d537500000600791f301ee616d5c01843e0650053c0e385472da7222a2bb70100af5ba514d40000efa0008000000000a96fa9a1e8d1843e770afd6e9ef5837dbd0000ce08467a2c4436f15778013fc8d0c1d5", 0x6c, 0x0, 0x0, 0x0) 00:24:24 executing program 5: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000480)=""/101) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000240)='GPLvboxnet1trusteduser@\x00'}, 0x30) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socket$inet(0x2, 0x4000000000000001, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f0000000400)='md5sumem1wlan1\x00', 0xf, 0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200)={'\x00', 0x3}, &(0x7f0000000240), 0x0, 0xfffffffffffffffe) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x3) sendmsg$nl_route(r4, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) write$P9_RVERSION(r0, &(0x7f00000001c0)={0x15, 0x65, 0xffff, 0x7fffffff, 0x8, '9P2000.L'}, 0x15) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioprio_get$uid(0x3, 0x0) 00:24:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x30) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x8) bind$inet(r0, &(0x7f0000000180)={0x2, 0x1004e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000140)=0x99, 0xfea9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, 0x0, 0xfffffdb6, 0x20048045, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) 00:24:24 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='security.apparmor\x00', &(0x7f0000000140)=""/125, 0x7d) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000000100)='./file0/file0\x00') r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000200)={0x17, 0xa0, &(0x7f0000000280)="25cfbae93421a57fadf54288487ccfd28e88b27451184d98f57133f84e074eb7f8753a863396d30c887cd2d8d12e28c37b76062066fcfdf71bd5bfa01019f4223840212e715970d2d26d2e0b67bc633b3e0746ca993f31a9d99a6376b3c754971e1114c856204e64da0a432c8d134d291c6027a358d32477e49467046740fd8e550f949a4c1b66b3c9b54e92715709faac4ce9bcce653a5bb26ef89f6578c798"}) 00:24:24 executing program 4: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x5) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={r0, r0, 0x5, 0x3}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') prctl$PR_SET_TIMERSLACK(0x1d, 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000340), 0xfffffdaa) r4 = creat(&(0x7f0000000140)='./bus\x00', 0x169) setxattr$security_evm(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "d1dadb600adb2b3c6f9943f7e6c850329338a0aa"}, 0x15, 0x1) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000300)) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_int(r0, &(0x7f0000000380)=0x7, 0x12) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xffffffffffffff28, 0x100, 0x0, 0x5, 0x0, 0x10, "6d28e7661da0a942c33b734e6249243a53e00d94b2387b32ec936269c693ab270523cc0744b24d7491a9576fec58d45260e036e997316d185ff90f52a4257b62", "532cf77526dd31066f452edf8f4715abca9427e06dd4c9aab23f8b39c67310530a5fbe6343109580e8056f79ee10aaa3fbfe6f3e8964b18f45646566c0a29694", "389cca623cbad107d17e231dc223be320a6ca7b6284e69901d0b279bf77f1353", [0x6, 0x4]}) getpeername$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000440)=r5) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) 00:24:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r2 = accept(r0, 0x0, 0x0) r3 = dup3(r2, r2, 0x80000) ioctl$RTC_PIE_ON(r3, 0x7005) shutdown(r0, 0x1) 00:24:24 executing program 2: clone(0x802122001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="acff7cf90800ff80f5454c696e7578145f59bf50404cd1e215b4865781ecd637be97ce285a04fd9206b64aafd7b36ed1467672490b50f343ae54849e6014e0d38afc78125f00c5b86bab985de09526f3a5378bbe0893f062d7158d898a72601ca7cb1af32977c1bba9642cb08041fe104647f438d72362b90fdea3e212efb12b66924d76097b569463365e33ee44b7c2139500000000000000"], 0x10) write$selinux_load(r0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) [ 142.012379] SELinux: policydb magic number 0xf97cffac does not match expected magic number 0xf97cff8c [ 142.039743] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 142.040786] SELinux: failed to load policy [ 142.092888] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 142.123323] CPU: 1 PID: 4493 Comm: syz-executor2 Not tainted 4.14.97+ #4 [ 142.130169] Call Trace: [ 142.132761] dump_stack+0xb9/0x10e [ 142.136306] warn_alloc.cold+0x91/0x1ab 00:24:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') setsockopt$sock_int(r1, 0x1, 0xb, &(0x7f0000000540)=0x401, 0x4) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="dcb974e631821a", @ANYRES16=r2, @ANYBLOB="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"], 0x218}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r3 = fcntl$getown(r0, 0x9) ptrace$getregset(0x4204, r3, 0x7, &(0x7f0000000280)={&(0x7f0000000180)=""/234, 0xea}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000040)) [ 142.140283] ? zone_watermark_ok_safe+0x250/0x250 [ 142.145119] ? lock_acquire+0x10f/0x380 [ 142.149096] ? avc_has_perm+0x9c/0x350 [ 142.152991] ? avc_has_perm+0x1b7/0x350 [ 142.156963] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 142.161633] ? __vmalloc_node_range+0x390/0x690 [ 142.166300] ? trace_hardirqs_on+0x10/0x10 [ 142.170532] ? _raw_spin_unlock_irq+0x2b/0x50 [ 142.175038] ? _raw_spin_unlock_irq+0x35/0x50 [ 142.179545] ? sel_write_load+0x199/0xfb0 [ 142.183712] ? vmalloc+0x60/0x80 [ 142.187081] ? sel_write_load+0x199/0xfb0 00:24:25 executing program 0: r0 = add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, r0) r1 = request_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000480)='id_legacy\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000300)='keyring\x00', 0x0, 0x0, 0x0, r1) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x40) r2 = dup(0xffffffffffffffff) read$eventfd(r2, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x7, [@random="87efe89423c2", @local, @local, @empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @dev={[], 0xa}, @empty]}) link(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) openat(r2, &(0x7f0000000140)='./file0\x00', 0x200, 0x1ab) sendmsg$IPVS_CMD_SET_DEST(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0xa400) unshare(0x20600) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f00000000c0)={0x0, 0xbf}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 142.191229] ? sel_write_load+0x199/0xfb0 [ 142.195379] ? __mutex_lock+0x829/0x1430 [ 142.199438] ? sel_read_bool+0x240/0x240 [ 142.203506] ? trace_hardirqs_on+0x10/0x10 [ 142.207752] ? __vfs_write+0xf9/0x5a0 [ 142.211561] ? sel_read_bool+0x240/0x240 [ 142.215621] ? kernel_read+0x110/0x110 [ 142.219528] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 142.225002] ? rcu_read_lock_sched_held+0x10a/0x130 [ 142.230024] ? vfs_write+0x17f/0x4d0 [ 142.233742] ? SyS_write+0xc0/0x1a0 [ 142.237363] ? SyS_read+0x1a0/0x1a0 [ 142.240984] ? do_clock_gettime+0xd0/0xd0 [ 142.245145] ? do_syscall_64+0x43/0x4b0 [ 142.249113] ? SyS_read+0x1a0/0x1a0 [ 142.252756] ? do_syscall_64+0x19b/0x4b0 [ 142.256823] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 142.307510] warn_alloc_show_mem: 1 callbacks suppressed [ 142.307514] Mem-Info: [ 142.336884] active_anon:82922 inactive_anon:9133 isolated_anon:0 [ 142.336884] active_file:9156 inactive_file:15092 isolated_file:0 [ 142.336884] unevictable:0 dirty:121 writeback:24 unstable:0 [ 142.336884] slab_reclaimable:7083 slab_unreclaimable:57540 [ 142.336884] mapped:58611 shmem:49 pagetables:1544 bounce:0 [ 142.336884] free:1400285 free_pcp:303 free_cma:0 [ 142.385461] Node 0 active_anon:331688kB inactive_anon:36532kB active_file:36624kB inactive_file:60468kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234444kB dirty:584kB writeback:96kB shmem:196kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 142.435904] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 142.517740] lowmem_reserve[]: 0 3437 3437 [ 142.528699] Normal free:2520624kB min:5476kB low:8992kB high:12508kB active_anon:331688kB inactive_anon:36532kB active_file:36624kB inactive_file:61268kB unevictable:0kB writepending:1332kB present:4718592kB managed:3521424kB mlocked:0kB kernel_stack:4320kB pagetables:6176kB bounce:0kB free_pcp:1104kB local_pcp:624kB free_cma:0kB [ 142.567857] lowmem_reserve[]: 0 0 0 [ 142.583499] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB [ 142.605866] Normal: 3096*4kB (UME) 3042*8kB (UME) 2364*16kB (UME) 32*32kB (UME) 203*64kB (UME) 59*128kB (UM) 19*256kB (UM) 6*512kB (UM) 2*1024kB (M) 3*2048kB (M) 588*4096kB (M) = 2520688kB [ 142.625035] 24592 total pagecache pages [ 142.629676] 0 pages in swap cache [ 142.636564] Swap cache stats: add 0, delete 0, find 0/0 [ 142.651167] Free swap = 0kB [ 142.654234] Total swap = 0kB [ 142.657248] 1965979 pages RAM [ 142.661399] 0 pages HighMem/MovableOnly [ 142.668446] 315705 pages reserved [ 142.672340] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 142.693617] CPU: 1 PID: 4492 Comm: syz-executor2 Not tainted 4.14.97+ #4 [ 142.700466] Call Trace: [ 142.703073] dump_stack+0xb9/0x10e [ 142.706625] warn_alloc.cold+0x91/0x1ab [ 142.711112] ? zone_watermark_ok_safe+0x250/0x250 00:24:25 executing program 5: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000480)=""/101) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000240)='GPLvboxnet1trusteduser@\x00'}, 0x30) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socket$inet(0x2, 0x4000000000000001, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f0000000400)='md5sumem1wlan1\x00', 0xf, 0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200)={'\x00', 0x3}, &(0x7f0000000240), 0x0, 0xfffffffffffffffe) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x3) sendmsg$nl_route(r4, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) write$P9_RVERSION(r0, &(0x7f00000001c0)={0x15, 0x65, 0xffff, 0x7fffffff, 0x8, '9P2000.L'}, 0x15) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioprio_get$uid(0x3, 0x0) 00:24:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000004c0)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x8, 0x3, [@loopback]}, 0x18) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f00000001c0)={'hsr0\x00', @ifru_addrs=@can={0x1d, 0x0}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@empty, 0x0, r1}) 00:24:25 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) [ 142.715965] ? lock_acquire+0x10f/0x380 [ 142.719939] ? avc_has_perm+0x9c/0x350 [ 142.723860] ? avc_has_perm+0x1b7/0x350 [ 142.727840] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 142.732519] ? __vmalloc_node_range+0x390/0x690 [ 142.737237] ? sel_write_load+0x199/0xfb0 [ 142.741400] ? vmalloc+0x60/0x80 [ 142.744762] ? sel_write_load+0x199/0xfb0 [ 142.748908] ? sel_write_load+0x199/0xfb0 [ 142.753093] ? sel_read_bool+0x240/0x240 [ 142.757157] ? trace_hardirqs_on+0x10/0x10 [ 142.761413] ? __vfs_write+0xf9/0x5a0 [ 142.765227] ? sel_read_bool+0x240/0x240 [ 142.769292] ? kernel_read+0x110/0x110 [ 142.773211] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 142.778668] ? rcu_read_lock_sched_held+0x10a/0x130 [ 142.783691] ? vfs_write+0x17f/0x4d0 [ 142.787441] ? SyS_write+0xc0/0x1a0 [ 142.791076] ? SyS_read+0x1a0/0x1a0 [ 142.794791] ? do_clock_gettime+0xd0/0xd0 [ 142.798944] ? do_syscall_64+0x43/0x4b0 [ 142.802922] ? SyS_read+0x1a0/0x1a0 [ 142.806559] ? do_syscall_64+0x19b/0x4b0 [ 142.810635] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 00:24:25 executing program 3: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:25 executing program 2: r0 = memfd_create(&(0x7f0000000300)='\x0f\x02\x80\x05,\x04\xad\xe5\xba\xed\xfa\x9c:!)\xa1\ff\x9a\xeazo\xf1\tB\xd9`_\x05,g\x10KSW\x92Q\xcbo\xdfJ|\xe2\x9bc/\x13\x93-\bH=\xf3\xd1\xb6\xd98\xf5\xc9\xf4\xf8\xa5Ci\x8c\xc6\x85(7\xdc\x12,\b\xca\x88i88\n{H\xe9\x7f[\xea\'\\\x06h\xc9\x14v\x14 \xef\x12\xe5\xa9>\x1e\"\\\x9f@\x1e\xc1\xee1JJ\xa8\xb2\x15\t\xbet\x90\x92', 0x0) write$eventfd(r0, &(0x7f0000000240)=0x20000000000080, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfefe) ioctl$void(r0, 0xc0045878) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000180)="2468e686dfa567069d7d72623fc25f5ff0622cd1db84eb5e9bfabdba5b33bccb23b189a9189c74f3729d57b1d744d9a99287f36ad63f95fc62c08202549617", &(0x7f00000001c0)=""/60}, 0x18) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) seccomp(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v2={0x7, 0x3, 0x1, 0x876, 0x2a, "d83674b011db38d6ee6a0a10ce9cd44553c8cf3b6b2e5a13564bdd6029a91e08a312aed86473f595b03b"}, 0x34, 0x3) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x444, &(0x7f0000000000)=[{}]}, 0x10) getsockopt(r2, 0x0, 0xfd, &(0x7f0000000380)=""/206, &(0x7f0000000280)=0xce) [ 142.915492] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 142.933140] SELinux: policydb magic number 0xf97cffac does not match expected magic number 0xf97cff8c [ 142.956781] SELinux: failed to load policy 00:24:26 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) [ 143.018734] FAT-fs (loop3): Unrecognized mount option "codepage=4³7" or missing value [ 143.107350] audit: type=1326 audit(1549499066.070:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4553 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ac9a code=0x0 00:24:26 executing program 5: socketpair$unix(0x1, 0x4000000000007, 0x0, &(0x7f0000000240)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fchdir(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() waitid(0x2, r1, 0x0, 0x41000007, 0x0) 00:24:26 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x210, r2, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x984}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x87e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ab}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x16a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x3}}}}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x4040000}, 0x800) write$P9_RLERROR(r1, &(0x7f0000000140)={0x1e, 0x7, 0x1, {0x15, '/proc/self/net/pfkey\x00'}}, 0x1e) r3 = socket(0x10, 0x100000003, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x5c, r2, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa94}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfa}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x18}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x5c}}, 0x4000) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@mpls_newroute={0x24, 0x18, 0x120, 0x70bd29, 0x25dfdbfe, {0x1c, 0x20, 0x30, 0x100000001, 0xff, 0x2, 0x0, 0xf, 0x900}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x7) ioctl$BLKRRPART(r4, 0x125f, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 00:24:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$eventfd(r1, &(0x7f00000001c0)=0x9, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3bb5c59, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$UHID_INPUT2(r2, &(0x7f00000000c0)={0xc, 0x8a, "aab118edd2c6fc8d3aaec15bf117eb03042d8edf7c0c6989e5c9f8776ae36eebf7106154835041e580d14d4f95f53f2ad366244d7dc6666c3b8ee04b631968c48ca06e2e3a94d2fc87dc33dd4d02c6a7cb5ead034673b9c6307d3f68a2bcb11c0b1ca1a9d99244f40f7a1c9bb65c0aa51e5b015a95682120130c80d413f85b4490bcc8f6122f789709fe"}, 0x90) [ 143.263598] syz-executor4 (4483) used greatest stack depth: 23768 bytes left 00:24:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = getpgid(0xffffffffffffffff) waitid(0x1, r1, &(0x7f0000000000), 0x0, &(0x7f0000000080)) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x2000011, r0, 0x800000000) 00:24:26 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x210, r2, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x984}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x87e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ab}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x16a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x3}}}}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x4040000}, 0x800) write$P9_RLERROR(r1, &(0x7f0000000140)={0x1e, 0x7, 0x1, {0x15, '/proc/self/net/pfkey\x00'}}, 0x1e) r3 = socket(0x10, 0x100000003, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x5c, r2, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa94}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfa}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x18}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x5c}}, 0x4000) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@mpls_newroute={0x24, 0x18, 0x120, 0x70bd29, 0x25dfdbfe, {0x1c, 0x20, 0x30, 0x100000001, 0xff, 0x2, 0x0, 0xf, 0x900}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x7) ioctl$BLKRRPART(r4, 0x125f, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) [ 143.397706] audit: type=1400 audit(1549499066.360:36): avc: denied { map } for pid=4586 comm="syz-executor0" path="socket:[13696]" dev="sockfs" ino=13696 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 00:24:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x210, r2, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x984}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x87e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ab}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x16a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x3}}}}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x4040000}, 0x800) write$P9_RLERROR(r1, &(0x7f0000000140)={0x1e, 0x7, 0x1, {0x15, '/proc/self/net/pfkey\x00'}}, 0x1e) r3 = socket(0x10, 0x100000003, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x5c, r2, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa94}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfa}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x18}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x5c}}, 0x4000) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@mpls_newroute={0x24, 0x18, 0x120, 0x70bd29, 0x25dfdbfe, {0x1c, 0x20, 0x30, 0x100000001, 0xff, 0x2, 0x0, 0xf, 0x900}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x7) ioctl$BLKRRPART(r4, 0x125f, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 00:24:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCLUNK(r0, &(0x7f0000000200)={0x7, 0x79, 0x1}, 0x7) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000c0500000000001b0300000000000000f4546b2a010000008c57e1e99e2eaa16f320792d9306c7157639331a35feef10c456c9db1a5f08df8016fb26f08749a65000000000000000a42979f70000000000000000000000000000"], 0x5b) sync_file_range(r0, 0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x40000, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000002c0)=0xc) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x1) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) pwritev(r1, &(0x7f0000000280)=[{&(0x7f00000001c0)="8a37ac5bbce41440d10a0f9b3f7fc29b810fdef1e386731392", 0x31c}, {0x0, 0x2b5}], 0xffffffffffffff9, 0xfffffffffffffffc) shutdown(r1, 0x1) 00:24:26 executing program 1: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000000)=0x3) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000240)={0x0, 0x1}) ptrace(0x10, r1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) 00:24:26 executing program 3: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000001c0)) ioctl$TCXONC(r1, 0x540a, 0x2) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000180)={0x9, 0x6, 0xfffffffffffffffd, 0x7}, 0x10) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000200)={0x8000, 0x9}) keyctl$link(0x8, r0, r2) [ 143.812673] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 143.832370] audit: type=1326 audit(1549499066.790:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4553 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ac9a code=0x0 00:24:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@updsa={0x104, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in=@remote, 0x2, 0x2b}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@dev}]}, 0x104}}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) fsync(r1) 00:24:26 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='sit0\x00', 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 00:24:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) close(r3) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYPTR], 0x8) close(r2) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000040)={0x2, 0x1f}) 00:24:26 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000d80)=ANY=[@ANYBLOB], 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=""/4096, 0x1000) mlockall(0x41000002) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000000f3ffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x0, 0x4003ff) write$cgroup_type(r4, &(0x7f0000001500)='threaded\x00', 0xb009009c3b52658e) r5 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x802) sendfile(r2, r2, 0x0, 0x3) unshare(0x40000000) vmsplice(r0, &(0x7f00000013c0)=[{&(0x7f00000012c0)="15469da7b8537e269acea341c45a4c4a4086c9d0173aeb9a0955eb6c272b198e4a8534257903a834299923c3e4199979af584de1055b185e5a1ffdb0a4c640d8c07c404731990c0fb1c37d70ea10636205ade76ce0b40920af15ad0035f537087fd316136068474bd82d8534839ec89285e4f82ba1dcf4974b57365bf11efa6d75c7ae7910db286e0d0ad5f522912f6e09bf5872e3dcfcb360c03348fd05f7985facc07ccb2be9392358180f093d1a7b24499a2a491eaa975fcef06ac7e2b7169218464cdfd4d37065f7edaba085fc8b57320b5d445f79eb6913ef0798620b8e71b1d064f7f3b23e3d136c40931ea2b3b9cfe3334a41c589ff70f3a7c6", 0xfd}], 0x1, 0x8) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$void(r2, 0xc0045c79) splice(r5, &(0x7f0000001400), r2, &(0x7f0000001440)=0xa, 0x5, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x80000) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000001480)={0x5, 0x1bfa, 0x7ff, 0x3, 0x6}) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0x26, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0063404000000000000000000000000000000000000000000000000000000000000000f608db"], 0x0, 0x0, 0x0}) prctl$PR_SET_UNALIGN(0x6, 0x5cf46cc6b365cb15) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$TCFLSH(r0, 0x540b, 0x4) [ 143.946729] mip6: mip6_rthdr_init_state: spi is not 0: 33554432 [ 143.953096] sched: DL replenish lagged too much [ 143.987820] mip6: mip6_rthdr_init_state: spi is not 0: 33554432 00:24:27 executing program 2: fstat(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) setreuid(r0, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x12, 0x0, &(0x7f0000000240)={0x0, {}, 0x0, &(0x7f0000000000)="c4a2193ee70ffd9d080000002e0ffa6bf8f0418145a700000081c4e1c962ad0000010044d922c44135f330f3460f5221c4c17850d96bc832"}, 0x8, &(0x7f0000000280)) 00:24:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x40030a) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = dup2(r1, r0) ioctl$KDDISABIO(r2, 0x4b37) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000009c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\xb4(-$\xde`\x97\x8c\xe6\xcd\x8d\x99\x03\xe5u\x97\x14\xb0\xd6\xd0\xae\xcf\xd9\x1e\x1f\xd00=#\xa3\xd4v\xd8\xbdj\x10(\xb6\xf7\x15\xe1\x88\xe7]\xca\xdc\x02\xdc\v\xbd@T\xea\xb7XmW\xffk\xc4\x96M|\xf1\x1f\xfa$\xf8IW\xc4J\xc6\xf0_\xc3\x86\x0f\xbd\x83V\x9ar\x02\xbf\xa0+\xe2.i\x7fP\xebnW\x90\x8d\xc5\xc7w\t\xeb\xd9\xec\xd8\x87WA\xee\x15O]\xafI\x03\x9b\x9f\"\x1c\vMdKm\x7f$\"cIB#\xe1Zt\xc7\xc7\x9f\xa0\xd3\x18\x1d\t\xee\x86\xe8\xda\xae\xeeo\xf8s6WK5:\a\xa5\x89\x9a8\xb4\'\xf7\a\xe6\xbe\"<\xd2IS\x04\xb4\xb4\xee\x80\a\x9d\x1b\x15\xfa\xadAB\xdf\x17l\'7\xf9[\xe17\xcb\xdcF\x87\xddW[#\xa5\x1cK&\x13\x1cF\x0e\xd5O\xf3\xd9\xc1\x0eYwk}\xbc \xe8\xd0l\xe1\xe2\x9a\x84') 00:24:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$eventfd(r1, &(0x7f00000001c0)=0x9, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3bb5c59, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$UHID_INPUT2(r2, &(0x7f00000000c0)={0xc, 0x8a, "aab118edd2c6fc8d3aaec15bf117eb03042d8edf7c0c6989e5c9f8776ae36eebf7106154835041e580d14d4f95f53f2ad366244d7dc6666c3b8ee04b631968c48ca06e2e3a94d2fc87dc33dd4d02c6a7cb5ead034673b9c6307d3f68a2bcb11c0b1ca1a9d99244f40f7a1c9bb65c0aa51e5b015a95682120130c80d413f85b4490bcc8f6122f789709fe"}, 0x90) 00:24:27 executing program 5: r0 = socket(0x11, 0x5000802, 0x3) write(r0, &(0x7f0000000040)="240000001a0099f0003be90000ed190e02203b9fe95f8a08087f0000000000ba00800800", 0x24) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x86ca, 0x4) 00:24:27 executing program 5: clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc00000003000600000000190200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8202a80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[]}, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xd4, r3, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xb8, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd353}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xec}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf4af}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) exit(0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000440)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 00:24:27 executing program 1: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:27 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x8c, 0x1, {"3b85c8be22f274e7d71f102af96221a991c2be0f40f947db5d70cce163c9769e5c9388fe634213b22931481a5d6d6b8783a89da7c843adecf47c44ca35c260e045813003e97d185c3cef65ea684fde87ae646b6ccdb547ae2a5f80653dfa692227f1f72495171cf2ef3e15ee0d262521902f"}}, {0x0, "c533dccd4f4639c60f1e3a4d2b0772ff186b451ce2766009c7739b2b0ba689eaec4db4d5906ccf61343c18c04e02a062ffa843e875413b2bbeb5798739ce5e334fd3f839d3c08bb86fb6ef575b0575e8426e8684c2"}}, &(0x7f0000000240)=""/252, 0xe3, 0xfc}, 0x20) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)="e871c3abf66ff4d9427c31511b2d27facf82f65ee4c950d3917e5d6dffb0bf26f846f247a32cbd11f92950793fb618825db126de4f10c4aaf6cf39b06d97bd7fe85803ab76d7641dcd0d3d729c5d2c0a08151b22c89a83326c438864fbc02ad344aaa5880b2ae8b9bafd13336c68939e3137a61a97d507506bb0d0d4db571274bd9898e35600134f1451fbf92fe2f9722d437375b4a3d8e88cf715786570deeccc1ccc2b65f2807c880ad2683d357f8dd12cdf", 0xb3, r0}, 0x68) r1 = socket$packet(0x11, 0x40000000003, 0x300) getsockopt$packet_buf(r1, 0x107, 0xc, 0x0, &(0x7f0000000040)) 00:24:27 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x8b, 0x1, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x8c, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x4) 00:24:27 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000d80)=ANY=[@ANYBLOB], 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=""/4096, 0x1000) mlockall(0x41000002) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000000f3ffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x0, 0x4003ff) write$cgroup_type(r4, &(0x7f0000001500)='threaded\x00', 0xb009009c3b52658e) r5 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x802) sendfile(r2, r2, 0x0, 0x3) unshare(0x40000000) vmsplice(r0, &(0x7f00000013c0)=[{&(0x7f00000012c0)="15469da7b8537e269acea341c45a4c4a4086c9d0173aeb9a0955eb6c272b198e4a8534257903a834299923c3e4199979af584de1055b185e5a1ffdb0a4c640d8c07c404731990c0fb1c37d70ea10636205ade76ce0b40920af15ad0035f537087fd316136068474bd82d8534839ec89285e4f82ba1dcf4974b57365bf11efa6d75c7ae7910db286e0d0ad5f522912f6e09bf5872e3dcfcb360c03348fd05f7985facc07ccb2be9392358180f093d1a7b24499a2a491eaa975fcef06ac7e2b7169218464cdfd4d37065f7edaba085fc8b57320b5d445f79eb6913ef0798620b8e71b1d064f7f3b23e3d136c40931ea2b3b9cfe3334a41c589ff70f3a7c6", 0xfd}], 0x1, 0x8) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$void(r2, 0xc0045c79) splice(r5, &(0x7f0000001400), r2, &(0x7f0000001440)=0xa, 0x5, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x80000) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000001480)={0x5, 0x1bfa, 0x7ff, 0x3, 0x6}) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0x26, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0063404000000000000000000000000000000000000000000000000000000000000000f608db"], 0x0, 0x0, 0x0}) prctl$PR_SET_UNALIGN(0x6, 0x5cf46cc6b365cb15) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$TCFLSH(r0, 0x540b, 0x4) 00:24:27 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xb, 0x800, 0x2000000) setsockopt(r1, 0x107, 0x1, &(0x7f0000000100)="010000000200000000071a80000001cc", 0x10) close(r1) [ 144.808928] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:27 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x108) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/234, 0xea) r1 = syz_open_procfs(0x0, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="6116d17a041e0c34b3c2af4ada063481b07117eb77a2100399fcd35d7227ff67f9bba044508619edeef41497dce317feb5b492f3fea596e70e485c44ee4de903cf78e93e464d22ae7b71ad8ae28ea68581e8e14d8651bebb0e2f92accb1a94b7c0b5ee5ed9580f28d719f9ca2707195608f110", 0x73}], 0x1) 00:24:27 executing program 0: socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000180)={'nr0\x00', {0x2, 0x4e24, @multicast1}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000000540)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x28}]}, &(0x7f0000000200)='\xab\xe5N\xfc\xd4\x15\x7f\x1e\xda\x02\xbf\xa3\x1eO\t\xdaT\xa8w\xd0+\xeb\xe5\x01\xa6O#\x02\x11\xa9\xdd\xc0u^/\xae\xef\x18\xfcT\xaam\xba\xb2#bj\x01\xe8\x7f\x19\xdd\xefj\tA)\x8a\x1e5u:\xd5\x88*\xbb\x19J~\x04N\xb3d\xb4\xad\xa8mBc5\x87S\xfdNh\xd8d\xb9\x80\x14\x1aU\x04\xbaB\x01\xe1\x9a\xe9\x1e\xcf\x03\xa6\x96|\x83.\a\xc7 J\x1d\x8b35\xffi,W\xf3\x8a}Y\xcf\x03\x8e\xc3\xca+\xac\xfb\xd1\xb4\xd4\bm\xe6\xae\x1d\xb85\xcf\xb8\xd9\xab\xb9\b\xa9^\xd6N\xc4)\x8b[\xb3\xa3\xbe\xbc\x04L>\xf5\xf4uv\x1b2\xfc9\xa4\xd8\xf4\xad\x01\a\xe2;\x1e\x8a`\r%\xde\xde\xf46\xbdxF\xd7\xbfI\xdf\xee\x95kc\xad\x87\\\xa4\xc4)8G\x91\x9e\x15u\x0e\xb7h\xc4\xa0\xcae\x97<8\xcdK\xa8R\xad\xf1\xcf$\xa1\x1dN\xfd\xae\x054\x84U\xb6\xdb9\xf2\xa0<\xa2\xb6\x16\t\xe4', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x24) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x10000}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) clock_gettime(0x5, &(0x7f0000000340)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) r5 = gettid() waitid(0x0, r5, &(0x7f00000002c0), 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) fstat(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000380)='./file0\x00', r6, r7) gettid() [ 145.045229] audit: type=1400 audit(1549499068.000:38): avc: denied { prog_run } for pid=4732 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:24:28 executing program 1: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:28 executing program 2: eventfd2(0x8, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) write$selinux_access(r0, &(0x7f0000000340)={'system_u:object_r:crack_db_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0xfff}, 0x45) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 145.612508] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:28 executing program 4: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) getsockopt$inet6_buf(r0, 0x29, 0x42, &(0x7f0000000100), &(0x7f0000000180)=0x3e8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="e16a993c13f4c88558cf5ff9022d9a87", 0x804, 0x1, 0x0, 0x3}, 0x20) socketpair(0xb, 0xe, 0x7ff, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000140)=0xfffffffffffffda5) 00:24:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbc}, [@ldst={0x7, 0x0, 0x0, 0x1c10a1}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x265, &(0x7f000000cf3d)=""/195}, 0x48) rt_sigtimedwait(&(0x7f0000000040)={0x5}, &(0x7f0000000080), &(0x7f0000000100), 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40000, 0x0) write$UHID_INPUT2(r0, &(0x7f00000002c0)={0xc, 0x7c, "7441720e08c05d2d4dbc18430b8f07ebaf650214a3d9e5ed4a5da78743aa59e8a2e435339da05ec60d4c229624192389ad920631c890c3f402eb34f7a7a8b24cd68422c14214815a13ace872bb64a36778e176cc64bc249b3b5b37197e7ad5cb589027da9259ea043082dca884e43bb325ff829052758772cf0f1332"}, 0x82) pipe(&(0x7f0000000200)) 00:24:28 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) r1 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L-', 0x80000000}, 0x28, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3, 0x10, r1, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 00:24:28 executing program 0: socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000180)={'nr0\x00', {0x2, 0x4e24, @multicast1}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000000540)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x28}]}, &(0x7f0000000200)='\xab\xe5N\xfc\xd4\x15\x7f\x1e\xda\x02\xbf\xa3\x1eO\t\xdaT\xa8w\xd0+\xeb\xe5\x01\xa6O#\x02\x11\xa9\xdd\xc0u^/\xae\xef\x18\xfcT\xaam\xba\xb2#bj\x01\xe8\x7f\x19\xdd\xefj\tA)\x8a\x1e5u:\xd5\x88*\xbb\x19J~\x04N\xb3d\xb4\xad\xa8mBc5\x87S\xfdNh\xd8d\xb9\x80\x14\x1aU\x04\xbaB\x01\xe1\x9a\xe9\x1e\xcf\x03\xa6\x96|\x83.\a\xc7 J\x1d\x8b35\xffi,W\xf3\x8a}Y\xcf\x03\x8e\xc3\xca+\xac\xfb\xd1\xb4\xd4\bm\xe6\xae\x1d\xb85\xcf\xb8\xd9\xab\xb9\b\xa9^\xd6N\xc4)\x8b[\xb3\xa3\xbe\xbc\x04L>\xf5\xf4uv\x1b2\xfc9\xa4\xd8\xf4\xad\x01\a\xe2;\x1e\x8a`\r%\xde\xde\xf46\xbdxF\xd7\xbfI\xdf\xee\x95kc\xad\x87\\\xa4\xc4)8G\x91\x9e\x15u\x0e\xb7h\xc4\xa0\xcae\x97<8\xcdK\xa8R\xad\xf1\xcf$\xa1\x1dN\xfd\xae\x054\x84U\xb6\xdb9\xf2\xa0<\xa2\xb6\x16\t\xe4', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x24) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x10000}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) clock_gettime(0x5, &(0x7f0000000340)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) r5 = gettid() waitid(0x0, r5, &(0x7f00000002c0), 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) fstat(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000380)='./file0\x00', r6, r7) gettid() 00:24:28 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0xffffffffffffffff, 0x10001, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) 00:24:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000aab000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x2b, @remote, 0x4e22, 0x1, 'lblc\x00', 0x8, 0x10001, 0x30}, {@broadcast, 0x4e23, 0x2, 0x5, 0x93c7, 0x7}}, 0x44) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000280)=0x0) r2 = creat(&(0x7f0000000240)='\x00', 0x10) ftruncate(r2, 0xbb1) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 145.911003] audit: type=1400 audit(1549499068.880:39): avc: denied { ioctl } for pid=4771 comm="syz-executor3" path="socket:[13900]" dev="sockfs" ino=13900 ioctlcmd=0x8903 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:24:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 145.963345] audit: type=1400 audit(1549499068.930:40): avc: denied { map } for pid=4772 comm="syz-executor5" path="/dev/rtc0" dev="devtmpfs" ino=5379 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:clock_device_t:s0 tclass=chr_file permissive=1 00:24:29 executing program 4: r0 = socket$inet6(0xa, 0x200000000000002, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="100000000000000000000000c6050000"], 0x10}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 00:24:29 executing program 4: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x8d05, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") setuid(0xee01) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 00:24:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x44040018}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x16c, r1, 0x321, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xea6000000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x401}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x400}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x570}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @broadcast}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x67}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3f}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x19}]}, 0x16c}, 0x1, 0x0, 0x0, 0x80}, 0x800) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f00000003c0)=r3, 0x12) preadv(r2, &(0x7f0000000a00)=[{&(0x7f00000000c0)=""/149, 0x95}], 0x1, 0x0) [ 146.165964] audit: type=1400 audit(1549499069.130:41): avc: denied { set_context_mgr } for pid=4797 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 146.195480] binder: BINDER_SET_CONTEXT_MGR already set [ 146.207642] binder: 4797:4800 ioctl 40046207 0 returned -16 00:24:29 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x25) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/12) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000100)) lseek(r1, 0x0, 0x2) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) sendfile(r1, r1, &(0x7f00000000c0), 0x7f8) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) fcntl$setstatus(r1, 0x4, 0x7fe) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00') stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 00:24:29 executing program 4: time(&(0x7f0000004dc0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='asymmetric\x00', &(0x7f0000005400)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x101) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'bond_slave_0\x00'}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000058c0)=0x9) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000004e00)=0x3d7) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000005c40)={'team0\x00'}) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000006300)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) [ 146.494247] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x55, 0x10}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00}, 0x48) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x103400, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100004}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getspdinfo={0x14, 0x25, 0x100, 0x70bd28, 0x25dfdbfb, 0x6}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x20000000) 00:24:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) setreuid(r0, r1) 00:24:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x10) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000001c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000040)={0x0, @multicast2, 0x0, 0x0, 'none\x00'}, 0x2c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="606b9a974a00000127bd7000ffdbdf17ae1f005d8f023414be080300b302f11cfcdf5adfaf5e4d56d970c8d6f9bd9777a4e6a3a09ff4352d4c9e53698f935752e39a9bc213e5f328f9a104f14b2cfbfc267443f320fc309762115f95fab62a37d083809bc4651034f632066e0bd9db2164cf36fb932f"], 0x1}}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) ioctl$FICLONE(r0, 0x40049409, r0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f00000002c0)="a1d6da1f6b8b192d2e69e2a9eb9c2aa11a694e417dbde5a2e20135f98d3eef4db9410692a667200d1b57a1b305d399798b83ed8ee942b171d193f97ed594ef84b21e24e9a0134923265ff3a33cb7a2bdc32678f29a15d272da14f7f713084e9eeac14e9a3b8770ac01aa157afaa607a5cbea3ea59d84fc4b1a8a70d9d6d4c0ab3db594b722f6fb269c23fa5771b9ddcdc390d24ce838cb440e8bff4ba4eba025615b66161e274b8b1886caa90a8fddc61e3e410d3aaae45cfda1") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) 00:24:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:31 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:31 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x44}}, &(0x7f0000000480)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/pid\x00') 00:24:31 executing program 0: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$inet6(0xa, 0xa, 0xfffffffffffffff9) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000280)) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="8000abed683d8eeadc4a99c86daa7f8b15d20000010000001db9974be68100006c000008fc63000000000000010000100040000080000100e00000006d5ebe5a0000ffff53ef000000000e9d7617e5a9b65f8e11bbdf249a22181a5524820b5357ad3e03724e96987a6a4a25934faf4841329210f2ef8c10ea8038e582bf2c2d99c7931e0c7041640484969387dd10f35040d836bfdaac78c44672a8890e1d844fafc16c60900b5724de50bdb11e765cffb27c7dddba709f62a2474c89f1032121fb70f59acf0df4ae61289e320da8ea0996", 0xffffffffffffffb0, 0x400}], 0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) inotify_add_watch(r1, &(0x7f00000001c0)='./file0\x00', 0x2000648) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats_percpu\x00') ioctl$TIOCSTI(r2, 0x5412, 0x4) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 00:24:31 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/tcp\x00') socket$inet6(0xa, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) sendmsg$key(0xffffffffffffffff, 0x0, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) get_robust_list(0x0, 0x0, &(0x7f00000002c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000400)={0x5c, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4854e72f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8004}, 0x0) 00:24:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) setreuid(r0, r1) [ 149.053008] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:32 executing program 5: r0 = gettid() gettid() capget(&(0x7f0000000180)={0x20080522, r0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x48000000000}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000040)={0x2, 0x1000, 0x1}) [ 149.122522] FAT-fs (loop2): Unrecognized mount option "codepage=4³7" or missing value 00:24:32 executing program 5: r0 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) eventfd(0x8) io_setup(0x0, &(0x7f0000000440)=0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) linkat(r2, &(0x7f0000000040)='./bus\x00', r0, &(0x7f0000000480)='./bus\x00', 0x1000) write$ppp(r0, &(0x7f0000000100)="f7ee13c1093c8b3b5a164d6ee8bc9fad43f805336c923d995aeef383e9c15ebadcedaaf36c5e3c44e8b4b537300af25bedbda25aa8ef0eef8524c10bd45d8abbe4e2e9a1a7e065a374ef40df3caff9dbfe54dd4afe933948a599c9bfa1fa84f5d7e9f966b8bea7a8f504472ad8ba6c9703f9cc9d7d93fca8e48bce3de222d830f77336bb7fe9c17b9cd48c72922d4c51ab2e05b9c67758d24e1360f448fd967def30aefe84988827a9458e6a0a13ec7bfa14503ee6a9955d5145102e236aae43fe94ed58caa2a41d44341802d03de8a2d2bc8da583822041a928", 0xda) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002740)='rdma.current\x00', 0x0, 0x0) ftruncate(r4, 0x40001) sendfile(r3, r4, 0x0, 0x100000000000) fcntl$addseals(r4, 0x409, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001780)=@filter={'filter\x00', 0xe, 0x5, 0x11e8, [0x0, 0x20000580, 0x20001070, 0x20001388], 0x0, &(0x7f00000004c0), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x12, 0x80f3, 'team0\x00', 'syz_tun\x00', 'syz_tun\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @remote, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0xf0, 0x140}, [@common=@ERROR={'ERROR\x00', 0x20, {"e4073c877e2e2d62bb8e448d5d55eeab61d234a2b637658dc1a064ebdc6a"}}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz0\x00', 0x8}}}}, {{{0x9, 0x10, 0x88f8, 'veth1_to_team\x00', 'veth0_to_bridge\x00', 'ip6gre0\x00', 'gretap0\x00', @random="93751c277366", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x8e8, 0x948, 0x980, [@among={'among\x00', 0x850, {{0x7fff, 0x80, 0x2, {[0x3, 0x0, 0xfff, 0x8, 0x6, 0x80, 0x81, 0xd728, 0x1, 0x7fff, 0x9, 0x0, 0x7, 0xdd, 0x4, 0x72, 0x9, 0xff87, 0x8000, 0x6, 0x8, 0x2, 0x101, 0x5, 0x14, 0x4, 0x4, 0x5, 0x2, 0x1ff, 0x8, 0x0, 0x7f, 0x6, 0x7ff, 0xff, 0x8, 0x7, 0x3, 0x98, 0x7, 0x90, 0x7ff, 0x7fff, 0x2, 0x100000001, 0x5, 0x1000, 0xf563, 0x50, 0x8, 0x1, 0x10000, 0x3, 0x8, 0x100000001, 0x3, 0x0, 0x5, 0x400, 0x3, 0x6, 0x100000001, 0x5432, 0x7fffffff, 0x4000000000, 0x4, 0x6, 0x4, 0x9, 0xfffffffffffffffb, 0x4, 0x9db, 0x4f6, 0x9f52, 0x3, 0x7ff, 0x200, 0xfffffffffffffff8, 0x4, 0x9, 0x5, 0x20, 0x2, 0x1, 0x1f, 0x0, 0x1, 0x4, 0xfffffffffffffffa, 0x8, 0x2, 0xc3, 0x7ff, 0xdc3d, 0x3, 0xffffffff, 0x1000, 0x0, 0x8, 0x80000000, 0x6, 0x8, 0x4771, 0x6, 0x651800, 0xa6, 0x9d8c, 0x3, 0x80, 0x81, 0x7, 0xcf2, 0x8e2, 0x1, 0x4, 0x7, 0x8, 0x2d, 0x2, 0x4, 0xfff, 0x3, 0x4, 0x270c000000000000, 0xffffffffffffffff, 0x4, 0x40, 0x7, 0x7fffffff, 0x4, 0x4, 0x20, 0x1, 0x8, 0x400, 0x52, 0x8, 0xffffffff, 0x0, 0x3, 0xd90, 0xffffffffffff0000, 0x7, 0x5, 0x4, 0xe17, 0x3ff, 0x8, 0x10000, 0x9, 0x9b6, 0x6, 0x6, 0xffff, 0x0, 0x9, 0x6, 0x1000, 0x8, 0x0, 0x7e, 0x6, 0x5, 0xa1c7, 0x6, 0x3, 0x6, 0xfa0, 0x100, 0x3ff, 0x1, 0x4, 0x8000, 0x0, 0x40, 0x8001, 0x9, 0x7, 0x3, 0x3fed, 0x1, 0x6, 0x10001, 0x10000, 0x0, 0x410, 0xe44, 0x4, 0x80000001, 0x6200000000000000, 0x7f, 0x8001, 0x8, 0x20, 0x1bd, 0x2, 0x5, 0x0, 0xff, 0x2, 0x22, 0x8, 0x4, 0x6, 0x3, 0xdc, 0x9, 0xe64, 0x7136f497, 0x1, 0xb9, 0xaf2a, 0x7f, 0x5, 0x8, 0x9, 0x7, 0xffffffff, 0x5, 0xc600, 0x1, 0x7, 0x2d5, 0x7fffffff, 0x3, 0x2, 0x4, 0x8, 0x3, 0xf1f, 0x7fffffff, 0x966f, 0x8, 0x10000, 0x2, 0x7ff, 0x4, 0x400, 0xff, 0x8, 0x2000000, 0x2, 0xcb9f, 0x9, 0x3, 0x0, 0x5, 0x0, 0x0, 0x2, 0x3, 0x20, 0x1, 0x3, 0x80, 0x3], 0x2, [{[0x9, 0x1], @rand_addr=0x13}, {[0x6], @rand_addr=0xfffffffffffffffe}]}, {[0x7fff, 0x10001, 0x10001, 0xfffffffffffffff7, 0x80, 0x4d0, 0x6, 0x81, 0x1, 0x8, 0x9, 0x5, 0x2, 0x167c1a0a, 0x6, 0x2, 0x5, 0x4a30, 0x6, 0xfffffffffffffe00, 0x4, 0x3, 0x7, 0x5, 0x1, 0x8, 0x5, 0x80000001, 0x3e, 0x3, 0x90b, 0x7ff, 0xfffffffffffffffd, 0x5, 0x7ff, 0x3, 0x4, 0x1, 0x8, 0x100000000, 0x2, 0xb608, 0x8, 0x7, 0x355, 0x7ff, 0x5, 0x2d, 0x6, 0x7fff, 0x3, 0x0, 0x5, 0x1ff, 0x10001, 0xff, 0x6, 0x96, 0x1, 0x3, 0x8, 0x9, 0xffffffff, 0x9, 0xff, 0x2, 0xffffffffffff8000, 0x65, 0x1, 0x5, 0x6, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x9, 0x100000001, 0x5a80, 0x7fff, 0x0, 0x100, 0xffffffffffff7d09, 0x5, 0x7, 0x1, 0x8000000000000, 0x400, 0xffffffff, 0x0, 0x40, 0x7, 0x800, 0x7fffffff, 0x7, 0x5, 0x81f9, 0x1ff, 0xffffffffffffffff, 0x2, 0x400, 0x6, 0x2, 0x2, 0x1, 0x3f, 0xa0, 0xb9f, 0xff8, 0x4, 0x4, 0x6, 0x5, 0x6, 0x0, 0x7ff, 0xffff, 0xfffffffffffffff7, 0x47, 0x3, 0x6, 0x7fffffff, 0x5, 0xffffffffffff4caa, 0x8000, 0xe74, 0x3, 0x2, 0x4, 0x0, 0x9, 0x1ff, 0x101, 0x2, 0x6, 0x80000001, 0x7f, 0x3fb6, 0x9, 0x474e, 0x8, 0xfff, 0x7, 0x75, 0x4, 0xebe8, 0x5, 0x53, 0x1, 0x3ff, 0x1ff, 0x2, 0x7, 0x0, 0x9, 0xc4, 0xfffffffffffffffd, 0x2, 0x8, 0x6, 0x4, 0x862, 0x0, 0x9, 0x3ff, 0x22e5, 0x0, 0xfff, 0x1, 0x1bd03f75, 0x21, 0x5, 0x9, 0x401, 0x0, 0x7fffffff, 0x6, 0x9, 0x80000001, 0x6, 0x5, 0x1, 0x8001, 0x1f, 0x3, 0xfc0000000000, 0x4, 0x900000000, 0x0, 0xfffffffffffffffe, 0x6, 0x8, 0xfff, 0x4, 0x5, 0x3, 0x6, 0x6fe, 0x4, 0xfffffffffffffff7, 0x1, 0x1, 0x0, 0x9, 0x8, 0x8, 0x1000, 0x9, 0x6, 0x4, 0x5, 0x1b, 0x6, 0x9, 0x3, 0x281db8ae, 0x9, 0x3ff, 0xb1c, 0x3, 0x6, 0x1, 0x0, 0x470, 0x6ab1, 0x9, 0x7fff, 0xfffffffffffffffd, 0x6, 0x13a, 0x8000, 0x95c2, 0x101, 0x3, 0x8, 0xbc9, 0x5, 0x10000, 0x5, 0x3ff, 0x6, 0x7, 0x8, 0xc92, 0x9, 0x8c1, 0x8, 0x7ff, 0x665, 0x6, 0x7fffffff, 0x9, 0x2, 0x0, 0x3, 0x10000, 0xfffffffffffffff9, 0xfff], 0x2, [{[0x2a2, 0x7fffffff], @loopback}, {[0x5, 0x5e94], @loopback}]}}}}]}, [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffc}}, @common=@STANDARD={'\x00', 0x8}]}, @common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{{{0x15, 0x10, 0x88a2, 'bcsf0\x00', 'team_slave_1\x00', 'bpq0\x00', 'syzkaller0\x00', @remote, [0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0xd0, 0x108, 0x158, [@m802_3={'802_3\x00', 0x8, {{0x0, 0x0, 0x1, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0x0, 0x8, 0x4, 0x6}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x27}, 0xfffffffffffffffd}}}]}, @common=@log={'log\x00', 0x28, {{0x5, "3ac176b850f4cce872e068d46a5557348add86409222b053da4779e9d932", 0x6}}}}, {{{0x3, 0x8, 0x0, 'sit0\x00', 'bridge_slave_1\x00', 'veth0_to_hsr\x00', 'rose0\x00', @broadcast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @remote, [0x0, 0x0, 0xff, 0x0, 0xff], 0xf0, 0x158, 0x190, [@vlan={'vlan\x00', 0x8, {{0x1, 0x2, 0x88ef, 0x2, 0x4}}}, @ipvs={'ipvs\x00', 0x28, {{@ipv4=@loopback, [0xff, 0xffffffff, 0xffffffff, 0xff], 0x4e24, 0x3b, 0x1, 0x4e21, 0x2, 0x18}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}, @common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x18}, 0x10}}}]}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x40, 0x885f, 'ip_vti0\x00', 'bond_slave_0\x00', 'irlan0\x00', 'bcsf0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x2f8, 0x380, 0x3b0, [@bpf0={'bpf\x00', 0x210, {{0xc, [{0x406110f0, 0x7, 0x3, 0xffffffff}, {0xffffffffffffffff, 0x80000000, 0x20, 0x8}, {0x3f, 0x1, 0x8, 0xd91e}, {0x4b1, 0x8, 0x1, 0x8}, {0x8, 0x3, 0x7, 0x8}, {0x6, 0xffffffffffff7fb0, 0xffe0000000000}, {0x4, 0x9e5a, 0x6, 0xaa5a}, {0x2, 0x800, 0x1, 0x7}, {0x52ef6d5b, 0x2, 0x8, 0x101}, {0x5c16fa9c, 0x81, 0xf7dd, 0x3}, {0x3, 0x100000001, 0x0, 0x81}, {0x2f1, 0x81, 0x9, 0x9}, {0x648, 0x3, 0x1000, 0x24e1}, {0x6, 0x7, 0x3ff, 0x76d}, {0x7, 0x7fffffff, 0x1, 0x4f}, {0x20, 0x6, 0x4, 0x72}, {0xdc97, 0x45b, 0x100000001, 0x6}, {0x3, 0x1, 0x599, 0x4}, {0x624, 0x2, 0x80000000, 0xfffffffffffff2a8}, {0x81, 0x9, 0x3, 0x9a}, {0x100000000, 0x2, 0x200, 0x80000000}, {0x3, 0x10001, 0x7ef, 0x6}, {0x4, 0x6, 0x3}, {0xfff, 0x80000000, 0x20, 0x8}, {0xfffffffffffffffa, 0x6, 0xb9d, 0xc7e8}, {0x7, 0xb1c7, 0x9f7, 0x400}, {0x1, 0x3ff, 0xaa6, 0x100000001}, {0xff, 0x5, 0x3, 0x6}, {0x1ff, 0x100000001, 0x7, 0x80}, {0x8, 0x7fff, 0x100, 0x6}, {0x6, 0x100000000, 0x5, 0x7}, {0x5, 0x2, 0x400000, 0x5}, {0x80000000, 0xac, 0x3}, {0x8, 0x1, 0xffffffffffffffff, 0x80000000}, {0x20, 0x8, 0x0, 0xd3}, {0xffffffffffff8000, 0x4d3, 0x6, 0x1}, {0x7fffffff, 0xfff, 0xfffffffffffffbff, 0x8}, {0x5, 0x400, 0x5}, {0x3, 0x3713, 0xfff, 0xbb15}, {0x0, 0x1, 0x8, 0x8}, {0x6, 0x0, 0x0, 0x8}, {0x100000000, 0x1200000000000000, 0x6b06, 0x9}, {0x3ff, 0x80000000, 0x0, 0x8a}, {0x5, 0x3f, 0x1000000000, 0x6}, {0x4, 0x9, 0x2, 0xffffffff}, {0x7fff, 0x7ff, 0x100000001, 0x1f}, {0x10001, 0xae8, 0x6, 0x28000000}, {0x6, 0x7, 0x8, 0x3ff}, {0xfff, 0x8ab1, 0xffff, 0x9}, {0x1, 0x8, 0x1, 0x7}, {0xfff, 0x4f, 0x3826, 0x7}, {0x3ff, 0x6, 0x100, 0x8}, {0x45f41dc, 0xff, 0x2, 0xfffffffffffffff8}, {0x1, 0x100000001, 0x0, 0x6}, {0x2, 0x9e, 0x2b2, 0xca}, {0x8, 0x2, 0x1, 0xfff}, {0x4, 0xe1, 0xfffffffffffffffc, 0xf596}, {0x0, 0x4, 0x2, 0x81}, {0x6, 0x3, 0x100000001, 0x8e6}, {0x100000000, 0x8, 0x3, 0x200}, {0x39f6, 0x2, 0x81, 0xffffffffffffffff}, {0xd1d, 0x0, 0x2, 0x99}, {0x2, 0x1, 0x6, 0x80000001}, {0x9, 0x1, 0x7fff, 0x3}], 0x5}}}, @helper={'helper\x00', 0x28, {{0x0, 'irc-20000\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x80000001, 0x4e7}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}]}, 0x1260) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="736561642d736501662f617474722f63757272656e74000000000000000000000000000000"], 0x25) io_submit(r1, 0x2, &(0x7f0000000400)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x53, r2, &(0x7f0000000200)="ee0796a009428f52206df625b5079ddafcd36316fc2f1b2dd3dd75368c254e693272c4fa7d19cfad3752d72dec24f63c84740257b05f669f551b3b0ef9e56b2e5846f9f43634d794b8661b4984f63d32e7fed38dfa132426c62dbf7b45662162bcffdc649edf531883a403aa514dba9e9fe52fcf500df27ffdc868ee011e5b9832ba60f5e949f94081b8c9d2a659fdd267fcb6c778e6eca87dddc7683e664fec1dcde187b95c285b4266ed893041c570c876e59e81fef15b8f70c15187cf2b67bf92b92f821be62a33961d10b091b47162", 0xd1, 0x5, 0x0, 0x2, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xf, 0x5, r2, &(0x7f0000000340)="5f40c685a502ebf3", 0x8, 0x9, 0x0, 0x3, r0}]) [ 149.290662] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:24:32 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socket$netlink(0x10, 0x3, 0x17) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)) dup3(r0, r1, 0x0) [ 149.351414] audit: type=1400 audit(1549499072.320:42): avc: denied { dyntransition } for pid=4901 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 00:24:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:32 executing program 5: r0 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) eventfd(0x8) io_setup(0x0, &(0x7f0000000440)=0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) linkat(r2, &(0x7f0000000040)='./bus\x00', r0, &(0x7f0000000480)='./bus\x00', 0x1000) write$ppp(r0, &(0x7f0000000100)="f7ee13c1093c8b3b5a164d6ee8bc9fad43f805336c923d995aeef383e9c15ebadcedaaf36c5e3c44e8b4b537300af25bedbda25aa8ef0eef8524c10bd45d8abbe4e2e9a1a7e065a374ef40df3caff9dbfe54dd4afe933948a599c9bfa1fa84f5d7e9f966b8bea7a8f504472ad8ba6c9703f9cc9d7d93fca8e48bce3de222d830f77336bb7fe9c17b9cd48c72922d4c51ab2e05b9c67758d24e1360f448fd967def30aefe84988827a9458e6a0a13ec7bfa14503ee6a9955d5145102e236aae43fe94ed58caa2a41d44341802d03de8a2d2bc8da583822041a928", 0xda) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002740)='rdma.current\x00', 0x0, 0x0) ftruncate(r4, 0x40001) sendfile(r3, r4, 0x0, 0x100000000000) fcntl$addseals(r4, 0x409, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001780)=@filter={'filter\x00', 0xe, 0x5, 0x11e8, [0x0, 0x20000580, 0x20001070, 0x20001388], 0x0, &(0x7f00000004c0), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x12, 0x80f3, 'team0\x00', 'syz_tun\x00', 'syz_tun\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @remote, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0xf0, 0x140}, [@common=@ERROR={'ERROR\x00', 0x20, {"e4073c877e2e2d62bb8e448d5d55eeab61d234a2b637658dc1a064ebdc6a"}}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz0\x00', 0x8}}}}, {{{0x9, 0x10, 0x88f8, 'veth1_to_team\x00', 'veth0_to_bridge\x00', 'ip6gre0\x00', 'gretap0\x00', @random="93751c277366", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x8e8, 0x948, 0x980, [@among={'among\x00', 0x850, {{0x7fff, 0x80, 0x2, {[0x3, 0x0, 0xfff, 0x8, 0x6, 0x80, 0x81, 0xd728, 0x1, 0x7fff, 0x9, 0x0, 0x7, 0xdd, 0x4, 0x72, 0x9, 0xff87, 0x8000, 0x6, 0x8, 0x2, 0x101, 0x5, 0x14, 0x4, 0x4, 0x5, 0x2, 0x1ff, 0x8, 0x0, 0x7f, 0x6, 0x7ff, 0xff, 0x8, 0x7, 0x3, 0x98, 0x7, 0x90, 0x7ff, 0x7fff, 0x2, 0x100000001, 0x5, 0x1000, 0xf563, 0x50, 0x8, 0x1, 0x10000, 0x3, 0x8, 0x100000001, 0x3, 0x0, 0x5, 0x400, 0x3, 0x6, 0x100000001, 0x5432, 0x7fffffff, 0x4000000000, 0x4, 0x6, 0x4, 0x9, 0xfffffffffffffffb, 0x4, 0x9db, 0x4f6, 0x9f52, 0x3, 0x7ff, 0x200, 0xfffffffffffffff8, 0x4, 0x9, 0x5, 0x20, 0x2, 0x1, 0x1f, 0x0, 0x1, 0x4, 0xfffffffffffffffa, 0x8, 0x2, 0xc3, 0x7ff, 0xdc3d, 0x3, 0xffffffff, 0x1000, 0x0, 0x8, 0x80000000, 0x6, 0x8, 0x4771, 0x6, 0x651800, 0xa6, 0x9d8c, 0x3, 0x80, 0x81, 0x7, 0xcf2, 0x8e2, 0x1, 0x4, 0x7, 0x8, 0x2d, 0x2, 0x4, 0xfff, 0x3, 0x4, 0x270c000000000000, 0xffffffffffffffff, 0x4, 0x40, 0x7, 0x7fffffff, 0x4, 0x4, 0x20, 0x1, 0x8, 0x400, 0x52, 0x8, 0xffffffff, 0x0, 0x3, 0xd90, 0xffffffffffff0000, 0x7, 0x5, 0x4, 0xe17, 0x3ff, 0x8, 0x10000, 0x9, 0x9b6, 0x6, 0x6, 0xffff, 0x0, 0x9, 0x6, 0x1000, 0x8, 0x0, 0x7e, 0x6, 0x5, 0xa1c7, 0x6, 0x3, 0x6, 0xfa0, 0x100, 0x3ff, 0x1, 0x4, 0x8000, 0x0, 0x40, 0x8001, 0x9, 0x7, 0x3, 0x3fed, 0x1, 0x6, 0x10001, 0x10000, 0x0, 0x410, 0xe44, 0x4, 0x80000001, 0x6200000000000000, 0x7f, 0x8001, 0x8, 0x20, 0x1bd, 0x2, 0x5, 0x0, 0xff, 0x2, 0x22, 0x8, 0x4, 0x6, 0x3, 0xdc, 0x9, 0xe64, 0x7136f497, 0x1, 0xb9, 0xaf2a, 0x7f, 0x5, 0x8, 0x9, 0x7, 0xffffffff, 0x5, 0xc600, 0x1, 0x7, 0x2d5, 0x7fffffff, 0x3, 0x2, 0x4, 0x8, 0x3, 0xf1f, 0x7fffffff, 0x966f, 0x8, 0x10000, 0x2, 0x7ff, 0x4, 0x400, 0xff, 0x8, 0x2000000, 0x2, 0xcb9f, 0x9, 0x3, 0x0, 0x5, 0x0, 0x0, 0x2, 0x3, 0x20, 0x1, 0x3, 0x80, 0x3], 0x2, [{[0x9, 0x1], @rand_addr=0x13}, {[0x6], @rand_addr=0xfffffffffffffffe}]}, {[0x7fff, 0x10001, 0x10001, 0xfffffffffffffff7, 0x80, 0x4d0, 0x6, 0x81, 0x1, 0x8, 0x9, 0x5, 0x2, 0x167c1a0a, 0x6, 0x2, 0x5, 0x4a30, 0x6, 0xfffffffffffffe00, 0x4, 0x3, 0x7, 0x5, 0x1, 0x8, 0x5, 0x80000001, 0x3e, 0x3, 0x90b, 0x7ff, 0xfffffffffffffffd, 0x5, 0x7ff, 0x3, 0x4, 0x1, 0x8, 0x100000000, 0x2, 0xb608, 0x8, 0x7, 0x355, 0x7ff, 0x5, 0x2d, 0x6, 0x7fff, 0x3, 0x0, 0x5, 0x1ff, 0x10001, 0xff, 0x6, 0x96, 0x1, 0x3, 0x8, 0x9, 0xffffffff, 0x9, 0xff, 0x2, 0xffffffffffff8000, 0x65, 0x1, 0x5, 0x6, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x9, 0x100000001, 0x5a80, 0x7fff, 0x0, 0x100, 0xffffffffffff7d09, 0x5, 0x7, 0x1, 0x8000000000000, 0x400, 0xffffffff, 0x0, 0x40, 0x7, 0x800, 0x7fffffff, 0x7, 0x5, 0x81f9, 0x1ff, 0xffffffffffffffff, 0x2, 0x400, 0x6, 0x2, 0x2, 0x1, 0x3f, 0xa0, 0xb9f, 0xff8, 0x4, 0x4, 0x6, 0x5, 0x6, 0x0, 0x7ff, 0xffff, 0xfffffffffffffff7, 0x47, 0x3, 0x6, 0x7fffffff, 0x5, 0xffffffffffff4caa, 0x8000, 0xe74, 0x3, 0x2, 0x4, 0x0, 0x9, 0x1ff, 0x101, 0x2, 0x6, 0x80000001, 0x7f, 0x3fb6, 0x9, 0x474e, 0x8, 0xfff, 0x7, 0x75, 0x4, 0xebe8, 0x5, 0x53, 0x1, 0x3ff, 0x1ff, 0x2, 0x7, 0x0, 0x9, 0xc4, 0xfffffffffffffffd, 0x2, 0x8, 0x6, 0x4, 0x862, 0x0, 0x9, 0x3ff, 0x22e5, 0x0, 0xfff, 0x1, 0x1bd03f75, 0x21, 0x5, 0x9, 0x401, 0x0, 0x7fffffff, 0x6, 0x9, 0x80000001, 0x6, 0x5, 0x1, 0x8001, 0x1f, 0x3, 0xfc0000000000, 0x4, 0x900000000, 0x0, 0xfffffffffffffffe, 0x6, 0x8, 0xfff, 0x4, 0x5, 0x3, 0x6, 0x6fe, 0x4, 0xfffffffffffffff7, 0x1, 0x1, 0x0, 0x9, 0x8, 0x8, 0x1000, 0x9, 0x6, 0x4, 0x5, 0x1b, 0x6, 0x9, 0x3, 0x281db8ae, 0x9, 0x3ff, 0xb1c, 0x3, 0x6, 0x1, 0x0, 0x470, 0x6ab1, 0x9, 0x7fff, 0xfffffffffffffffd, 0x6, 0x13a, 0x8000, 0x95c2, 0x101, 0x3, 0x8, 0xbc9, 0x5, 0x10000, 0x5, 0x3ff, 0x6, 0x7, 0x8, 0xc92, 0x9, 0x8c1, 0x8, 0x7ff, 0x665, 0x6, 0x7fffffff, 0x9, 0x2, 0x0, 0x3, 0x10000, 0xfffffffffffffff9, 0xfff], 0x2, [{[0x2a2, 0x7fffffff], @loopback}, {[0x5, 0x5e94], @loopback}]}}}}]}, [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffc}}, @common=@STANDARD={'\x00', 0x8}]}, @common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{{{0x15, 0x10, 0x88a2, 'bcsf0\x00', 'team_slave_1\x00', 'bpq0\x00', 'syzkaller0\x00', @remote, [0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0xd0, 0x108, 0x158, [@m802_3={'802_3\x00', 0x8, {{0x0, 0x0, 0x1, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0x0, 0x8, 0x4, 0x6}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x27}, 0xfffffffffffffffd}}}]}, @common=@log={'log\x00', 0x28, {{0x5, "3ac176b850f4cce872e068d46a5557348add86409222b053da4779e9d932", 0x6}}}}, {{{0x3, 0x8, 0x0, 'sit0\x00', 'bridge_slave_1\x00', 'veth0_to_hsr\x00', 'rose0\x00', @broadcast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @remote, [0x0, 0x0, 0xff, 0x0, 0xff], 0xf0, 0x158, 0x190, [@vlan={'vlan\x00', 0x8, {{0x1, 0x2, 0x88ef, 0x2, 0x4}}}, @ipvs={'ipvs\x00', 0x28, {{@ipv4=@loopback, [0xff, 0xffffffff, 0xffffffff, 0xff], 0x4e24, 0x3b, 0x1, 0x4e21, 0x2, 0x18}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}, @common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x18}, 0x10}}}]}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x40, 0x885f, 'ip_vti0\x00', 'bond_slave_0\x00', 'irlan0\x00', 'bcsf0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x2f8, 0x380, 0x3b0, [@bpf0={'bpf\x00', 0x210, {{0xc, [{0x406110f0, 0x7, 0x3, 0xffffffff}, {0xffffffffffffffff, 0x80000000, 0x20, 0x8}, {0x3f, 0x1, 0x8, 0xd91e}, {0x4b1, 0x8, 0x1, 0x8}, {0x8, 0x3, 0x7, 0x8}, {0x6, 0xffffffffffff7fb0, 0xffe0000000000}, {0x4, 0x9e5a, 0x6, 0xaa5a}, {0x2, 0x800, 0x1, 0x7}, {0x52ef6d5b, 0x2, 0x8, 0x101}, {0x5c16fa9c, 0x81, 0xf7dd, 0x3}, {0x3, 0x100000001, 0x0, 0x81}, {0x2f1, 0x81, 0x9, 0x9}, {0x648, 0x3, 0x1000, 0x24e1}, {0x6, 0x7, 0x3ff, 0x76d}, {0x7, 0x7fffffff, 0x1, 0x4f}, {0x20, 0x6, 0x4, 0x72}, {0xdc97, 0x45b, 0x100000001, 0x6}, {0x3, 0x1, 0x599, 0x4}, {0x624, 0x2, 0x80000000, 0xfffffffffffff2a8}, {0x81, 0x9, 0x3, 0x9a}, {0x100000000, 0x2, 0x200, 0x80000000}, {0x3, 0x10001, 0x7ef, 0x6}, {0x4, 0x6, 0x3}, {0xfff, 0x80000000, 0x20, 0x8}, {0xfffffffffffffffa, 0x6, 0xb9d, 0xc7e8}, {0x7, 0xb1c7, 0x9f7, 0x400}, {0x1, 0x3ff, 0xaa6, 0x100000001}, {0xff, 0x5, 0x3, 0x6}, {0x1ff, 0x100000001, 0x7, 0x80}, {0x8, 0x7fff, 0x100, 0x6}, {0x6, 0x100000000, 0x5, 0x7}, {0x5, 0x2, 0x400000, 0x5}, {0x80000000, 0xac, 0x3}, {0x8, 0x1, 0xffffffffffffffff, 0x80000000}, {0x20, 0x8, 0x0, 0xd3}, {0xffffffffffff8000, 0x4d3, 0x6, 0x1}, {0x7fffffff, 0xfff, 0xfffffffffffffbff, 0x8}, {0x5, 0x400, 0x5}, {0x3, 0x3713, 0xfff, 0xbb15}, {0x0, 0x1, 0x8, 0x8}, {0x6, 0x0, 0x0, 0x8}, {0x100000000, 0x1200000000000000, 0x6b06, 0x9}, {0x3ff, 0x80000000, 0x0, 0x8a}, {0x5, 0x3f, 0x1000000000, 0x6}, {0x4, 0x9, 0x2, 0xffffffff}, {0x7fff, 0x7ff, 0x100000001, 0x1f}, {0x10001, 0xae8, 0x6, 0x28000000}, {0x6, 0x7, 0x8, 0x3ff}, {0xfff, 0x8ab1, 0xffff, 0x9}, {0x1, 0x8, 0x1, 0x7}, {0xfff, 0x4f, 0x3826, 0x7}, {0x3ff, 0x6, 0x100, 0x8}, {0x45f41dc, 0xff, 0x2, 0xfffffffffffffff8}, {0x1, 0x100000001, 0x0, 0x6}, {0x2, 0x9e, 0x2b2, 0xca}, {0x8, 0x2, 0x1, 0xfff}, {0x4, 0xe1, 0xfffffffffffffffc, 0xf596}, {0x0, 0x4, 0x2, 0x81}, {0x6, 0x3, 0x100000001, 0x8e6}, {0x100000000, 0x8, 0x3, 0x200}, {0x39f6, 0x2, 0x81, 0xffffffffffffffff}, {0xd1d, 0x0, 0x2, 0x99}, {0x2, 0x1, 0x6, 0x80000001}, {0x9, 0x1, 0x7fff, 0x3}], 0x5}}}, @helper={'helper\x00', 0x28, {{0x0, 'irc-20000\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x80000001, 0x4e7}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}]}, 0x1260) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="736561642d736501662f617474722f63757272656e74000000000000000000000000000000"], 0x25) io_submit(r1, 0x2, &(0x7f0000000400)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x53, r2, &(0x7f0000000200)="ee0796a009428f52206df625b5079ddafcd36316fc2f1b2dd3dd75368c254e693272c4fa7d19cfad3752d72dec24f63c84740257b05f669f551b3b0ef9e56b2e5846f9f43634d794b8661b4984f63d32e7fed38dfa132426c62dbf7b45662162bcffdc649edf531883a403aa514dba9e9fe52fcf500df27ffdc868ee011e5b9832ba60f5e949f94081b8c9d2a659fdd267fcb6c778e6eca87dddc7683e664fec1dcde187b95c285b4266ed893041c570c876e59e81fef15b8f70c15187cf2b67bf92b92f821be62a33961d10b091b47162", 0xd1, 0x5, 0x0, 0x2, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xf, 0x5, r2, &(0x7f0000000340)="5f40c685a502ebf3", 0x8, 0x9, 0x0, 0x3, r0}]) 00:24:32 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd8}) syz_open_pts(r0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000100)="000000000308c38c2d000000000000006ff9da2e8af54b1d4e84011da826181c220d1994267f", 0x26) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x7, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setsig(r0, 0xa, 0x25) 00:24:32 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000040)={{r1, r2/1000+30000}, 0x1f, 0x1f, 0x1}, 0x18) epoll_pwait(r0, &(0x7f0000000080)=[{}, {}, {}], 0x3, 0x5, &(0x7f00000000c0)={0x5}, 0x8) read$eventfd(r0, 0x0, 0x0) 00:24:32 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:32 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000)=0x2, 0x800000000005, 0x2, 0x0, &(0x7f00000000c0), 0xffffffffffffffff) [ 149.995094] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x8a00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) [ 150.039389] futex_wake_op: syz-executor2 tries to shift op by 4095; fix this program [ 150.079760] FAT-fs (loop4): Unrecognized mount option "codepage=4³7" or missing value [ 150.105682] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 00:24:33 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40010000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0xfffffffffffffffd, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000004c0)={0x80, 0x0, 0x200, 0x1, 0xb, 0x0, 0x5, 0x2c, 0x0, 0x1000, 0x800, 0xb9}) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, 0x0) write$P9_RSTATFS(r1, 0x0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000200)={0x3, 0x5, 0x20, 0x6, 0x10, 0x9cf, 0x5274, 0x20, 0x40, 0x4}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000140)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) write$P9_RAUTH(r3, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)=0x0) fcntl$lock(r1, 0x25, &(0x7f00000000c0)={0x1, 0x0, 0x867c, 0x0, r4}) inotify_init() ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) ptrace$getenv(0x4201, r5, 0x7fffffff, &(0x7f0000000100)) get_robust_list(r4, &(0x7f0000000400)=&(0x7f00000003c0)={&(0x7f0000000380)={&(0x7f0000000280)}}, &(0x7f0000000440)=0x18) write$P9_RREAD(r3, 0x0, 0x0) 00:24:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="c5"], 0x1) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r3, 0x200001a0, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200100, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) bind$packet(r4, &(0x7f00000001c0)={0x11, 0x11, r5, 0x1, 0x5}, 0x14) 00:24:33 executing program 5: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000180)={0x2, 0xb33, 0x114, 0x1625, 0x6, 0x100000001}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000036c0)={0x0, {{0x2, 0x0, @empty}}}, 0x88) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) dup(r1) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) dup(0xffffffffffffffff) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x80000, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000003600)='security.capability\x00', 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000034c0)=[{{&(0x7f0000000080)=@ethernet={0x0, @link_local}, 0x80, 0x0}, 0xa1e}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000300)=""/154, 0x9a}, {&(0x7f00000003c0)=""/4, 0x4}, {&(0x7f0000000400)=""/129, 0x81}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/80, 0x50}, {&(0x7f0000001540)=""/59, 0x3b}, {&(0x7f0000001580)=""/193, 0xc1}], 0x7, &(0x7f0000001700)=""/110, 0x6e}, 0xffffffffffffff7f}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000001900)=""/129, 0x81}, {&(0x7f00000019c0)=""/59, 0x3b}, {&(0x7f0000001a00)=""/119, 0x77}, {&(0x7f0000001a80)=""/27, 0x1b}, {0x0}, {&(0x7f0000001b80)=""/234, 0xea}], 0x6, &(0x7f0000001d00)=""/105, 0x69}, 0x8}, {{0x0, 0x0, &(0x7f0000003380)=[{&(0x7f0000001e80)=""/125, 0x7d}, {&(0x7f0000001f00)=""/147, 0x93}, {0x0}, {0x0}, {&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/172, 0xac}, {&(0x7f0000003200)=""/187, 0xbb}, {0x0}], 0x8, &(0x7f0000003440)=""/103, 0x67}}], 0x4, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) 00:24:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:33 executing program 0: socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x2000000081) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000300)='/dev/keychord\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) get_robust_list(0x0, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) getegid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000340)=0x0) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000080)) ptrace$getsig(0x4202, r4, 0x4, &(0x7f0000000380)) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0xfffffe61) 00:24:33 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:33 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x3) tkill(r2, 0x1b) fdatasync(0xffffffffffffffff) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000040)=0x54) ptrace$cont(0x18, r2, 0x0, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="f2", 0x1}], 0x1) 00:24:33 executing program 4: r0 = socket$inet(0x2, 0x200080002, 0xa) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x480000, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, {{@in6=@dev}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000001c0)={0x6, {{0x2, 0x0, @multicast2}}}, 0x108) [ 150.800798] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:33 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000300)={0x1, 0x0, 0x0, 0xffffffb000000001}) 00:24:33 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:33 executing program 2: prctl$PR_GET_TIMERSLACK(0x1e) socket$key(0xf, 0x3, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0xffffffffffffff4e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) fremovexattr(r0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000780)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000700), 0xc, 0x0}, 0x20040000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x151) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x3, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x4, 0x10001, 0x0, 0x0, 0x8, 0x20, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$TIOCSETD(r2, 0x5423, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaa8b8, &(0x7f0000000200), 0x0, 0x0) 00:24:33 executing program 5: futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000080), 0xc0000000) timer_create(0x2, &(0x7f0000000000)={0x0, 0x19, 0x2000007, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_gettime(r0, &(0x7f00000000c0)) 00:24:33 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000240)=""/105, 0x69}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000001440)={0x12d, 0xffffffff, 0x6}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000340)={'ip6gretap0\x00', 0x600}) preadv(r1, &(0x7f00000013c0)=[{&(0x7f0000000080)=""/118, 0x76}, {&(0x7f0000000100)=""/150, 0x96}, {&(0x7f0000000000)=""/46, 0x2e}, {&(0x7f00000001c0)=""/110, 0x6e}, {&(0x7f00000002c0)=""/127, 0x7f}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x6, 0x0) [ 150.938923] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:34 executing program 5: r0 = memfd_create(&(0x7f0000004180)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0], 0x12) r1 = fcntl$dupfd(r0, 0x406, r0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:24:34 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) [ 151.106703] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) 00:24:34 executing program 0: r0 = socket(0x10, 0x2, 0x10000000c) write(r0, &(0x7f0000000040)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f3050300080001000104b13e23dcff", 0x1f) close(r0) 00:24:34 executing program 4: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x4, @ipv4={[], [], @multicast1}, 0x100000001}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r2) sendmsg$netlink(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x18, 0x1, 0x1, [r5, r1]}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 00:24:34 executing program 5: clone(0x200000000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000280)='/dev/rtc#\x00', 0xfffffffffffffffd, 0x0) ptrace(0x10, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc01000019000c0529bd7000fedbdf251e000000e80137000c0051000700000000000000fffa6b7daeb593645824e407d891ccf0ca018408008600", @ANYRES32=r2, @ANYBLOB="08000f00", @ANYRES32=r3, @ANYBLOB="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"], 0x1fc}, 0x1, 0x0, 0x0, 0x40}, 0x800) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x20, r0, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 00:24:34 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) [ 151.871828] audit: type=1400 audit(1549499074.840:43): avc: denied { write } for pid=5066 comm="syz-executor0" path="socket:[14261]" dev="sockfs" ino=14261 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 151.904822] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 151.917675] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 00:24:34 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x2, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 00:24:34 executing program 4: clone(0x1003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000080)={0x10000}, 0x8) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xffffffffffffff7c}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f0000000000)) rt_sigsuspend(&(0x7f0000000300), 0x8) [ 151.944811] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 151.953657] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 00:24:35 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000000)={{0x0, 0x0, 0x2, 0x2, 0xa2}, 0x3, 0x7}) read(r0, &(0x7f0000000300)=""/250, 0xfd63) fcntl$setpipe(r1, 0x407, 0xf2ce) 00:24:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x4, 0x5, 0x3e20, 0x1, 0x76400527}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@remote, 0x0, 0x32}, 0x0, @in6=@dev}}, 0xe8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000080), &(0x7f0000000340)) getsockopt$inet6_buf(r0, 0x29, 0x15, &(0x7f00000003c0)=""/116, &(0x7f00000000c0)=0x74) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x9, @mcast1, 0xc0e}, 0x1c) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000008c0)="3285311b82222a49cd48de8dfc0aea4a135e7fd59ec4a373a73e3545f260e53ddf85b3cd55d60f4b3fc111bf98c73262142deb1f510b528e91acd66515c833ad3eaaa7066be908d0b98af345bbb4676643d846864e105af4c45f86937fdb37830526ea91f56901", 0x67, 0x0) close(r1) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000440)=@generic={0x0, 0x800}) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000380)=0x9) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000940)={0x4, 0x4, 0x0, 0x8000, 0x8001, 0x5}) fcntl$getownex(r1, 0x10, &(0x7f00000007c0)={0x0, 0x0}) r6 = geteuid() pipe(&(0x7f0000000980)) r7 = getegid() sendmsg$unix(r2, &(0x7f0000000880)={&(0x7f0000000480)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000500)="1980ee6b9f9e6014d0d8cad0149811c0e3e08caecc04b6c272cc43b32390b2cec5b6eb563f817dee377086d18acec5718e6bd366057ae113a9dd282f71dac75cf9f8d8cde236b64626f05fa0dd8e466964ccbd5de4390061f070", 0x5a}, {&(0x7f0000000580)="cf7586800e9efdf95fa0416822f218d6edd897201bf7604e2545189484e69a68554f2566714b5f94da7570ce2d189cf2b4513673e36bb0541588371924e178cb592b0eabd47b51d7dc3ddc031a777834a1a0db2520469c8e7c09b3288900760d422a3ec4626bf709892e4aaf501fee06ed06ab7c24dfcf7c3e97fe986eee4c4c25ed07a398fd13d18299f5aef0e20d5e3e9f62ca0283c826ffeb0449d42161ac56ab854a3c4eeab2ea580e76760399c92bc6bc", 0xb3}, {&(0x7f0000000640)="2653e1e4c299fc2746a57b6bc1fbbf5f68209930ccc5d2d928a486b4ed99343e24a3480361b32f76a04edecbc2c3228c527c73ab1838c6e09cc1fc91130d4cd6282c56a48f67b41c8271614768409911884548787dd0ab5b44ebf6ddbcbbe7f5c47472aecd59b328fe906480e06b5a0b45b6b38884ebfe794589ae5995b8def42f5f820dbddf0aca78247fa403fb2d0f0bba5276f6bbdd92b6d98adae625628c33df99cf60130e13a41dd1e0ddf9eea19f852aa8ad89e8fc4e79ce131318514c8599c0c097ec50acfb06dc179c63ed9860149487cd87388699268050", 0xdc}, {&(0x7f0000000740)="dac6494a016e11860dd5d9fde7d5c2ba7a9dec255a779e953fa2ce0af0448030525ebf9bf3942eaa1792eb20feeeb82a9f5b852d1c4eb935", 0x38}], 0x4, &(0x7f0000000800)=[@rights={0x20, 0x1, 0x1, [r3, r2, r2]}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x58, 0x24000080}, 0x40880) ioctl$UI_BEGIN_FF_ERASE(r4, 0xc00c55ca, &(0x7f0000000080)={0x1, 0xbf, 0x4}) fstat(r0, &(0x7f0000000100)) 00:24:35 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000300)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000002c0)=0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getpeername(r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r3, 0x4, r4) fadvise64(r0, 0x20, 0xffffffffffffff7f, 0x4) getpeername(r2, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000240)='\x00', 0xfffffffffffffffe) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0x3, 0x4) [ 152.086073] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:35 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) getpeername(r0, &(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000000)=0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000100), 0x0, 0x800000000000000) 00:24:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) 00:24:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) ioctl$FICLONE(r0, 0x40049409, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x1f000000) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) 00:24:35 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) eventfd2(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='memory.events\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='status\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) getitimer(0x3, &(0x7f00000000c0)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) clone(0x40000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setreuid(0x0, 0xee01) 00:24:35 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r1, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @rand_addr="29afefa6b065564c72ef483d3fc62ed5", 0x5}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x424}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x4048804}, 0x4000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x6c, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1a}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7ff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r0}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 00:24:35 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x14, 0x0, &(0x7f0000000000)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f00000000c0)) 00:24:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1000000000000006, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e22, @broadcast}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/22) close(r1) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) fsetxattr$security_smack_transmute(r1, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0xffffffffffffff09, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x200, 0x7f, 0x9, 0x3591}) [ 152.760903] syz-executor5 (5131) used greatest stack depth: 23520 bytes left 00:24:35 executing program 4: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) setxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000000)=@v2={0x5, 0x2, 0x1, 0x5, 0x1a, "526755d3878903da1d4f72b00f30cbe699b69e05eeaf57d8dcb4"}, 0x24, 0x1000000000000) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000240)) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) socket$inet(0x2, 0x1, 0x5) 00:24:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fallocate(r0, 0x40, 0x100000001, 0x5) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) prctl$PR_GET_KEEPCAPS(0x7) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r2, &(0x7f0000000280)="22a12f4afc49391ee5227a52561c1f9e3355e2b1958fbec84414d5c17027a778d001e579a9f4384c03c66c9fc9566071cbf8edfa429ea8f99e958c29ddd3377daf5e76f1a9b91098550790d8c1541974204df89f46bd95a76b6e7a6e27b49f281d27dcf26d17936d6fb01e73a29ff9a09e9403f9b7b0e5a9ba76224044fd334ed1c71cc8ec219d9ee29a6f9637b5b121c3b6f148ee6dc36959e962dfba084940688cb6b3255063842636417bf99ed009c4a330dbd48547b921a5cb24ccaacf5a3c1b8c2e3d7d95175c77fc6f0680fd025bef"}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000005a00)=""/4096, 0x1000}], 0x1, &(0x7f0000000fc0)=""/38, 0x26}, 0x8}], 0x1, 0x0, &(0x7f0000001500)={0x77359400}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000005880)={'gre0\x00', {0x2, 0x4e20, @remote}}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{&(0x7f0000000ac0)=@alg, 0x80, &(0x7f0000000e40)=[{&(0x7f0000003540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, &(0x7f0000000ec0)={0x77359400}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000942000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r3, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) open$dir(&(0x7f0000000100)='./file0\x00', 0x80000, 0x88) sendmmsg(r3, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffbd47]}}, 0x80, &(0x7f0000000d40), 0x116, &(0x7f0000000d80)}}], 0x6d7, 0x40400d4) 00:24:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003dc0)='pids.current\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003e40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000003f80)={&(0x7f0000003e00), 0xc, &(0x7f0000003f40)={&(0x7f0000003e80)={0x84, r1, 0x30, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x38}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffffffffffff8000}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x38}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe0b0}]}, 0x84}, 0x1, 0x0, 0x0, 0x44000}, 0xc000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x1203e, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000003c0)=""/246) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000000)=""/92}) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)=0xfffffffffffffffd) [ 152.899271] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:35 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0xb, 0x7, 0x2000}, 0x4) 00:24:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fstat(r0, &(0x7f0000000340)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x74) pipe2(&(0x7f0000000200), 0x4800) fcntl$setsig(r0, 0xa, 0x2f) setsockopt$inet_opts(r0, 0x0, 0xa, &(0x7f0000000700)="6b0107ac30a255437fabb5af8f4e35e63a2d180cc05757f10dc8b8bd7795c83505d20600000000000000c95b335858c77e6ebfa8f80c3e25a96b9041593f13b4143d25ca5f1e919a283fd1a7651d46f03038ae04e7e168bf0ae4a9546121d452fcbc159191bf32730ea8ce2e68bc7f000000000000000000007692a337d443454fb0dcfb23245cbb21d103934018f34f3acebbe707c178a8f2a2d9023a1478d5af394d986c94650434f5613a04c71f872c600e39bccd0b8e2216816016471aad0a03c29dec2d1d699448857aaf353d42bca82d78ae9152756320eea56fcc97886758afd2105132dd4395b075284f85cea27953c19de20b03e6530d3b1a3384d753f406b0c0182bdb0fbf9e", 0x10b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000240)="c21903dc66f0cf4f069dcefadba536f91ddc8de9650368a7dc9404001b", 0x1d) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x10000000000e8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x7f}, 0x28, 0x1) open$dir(0x0, 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) sendto(r0, &(0x7f0000000040)="b6", 0x1, 0x1, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x7, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000850) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmmsg(r0, &(0x7f0000005680)=[{{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000440)=[{&(0x7f00000008c0)=""/199, 0xc7}], 0x1}}, {{&(0x7f0000005400)=@un=@abs, 0x80, &(0x7f0000005580), 0x0, &(0x7f00000055c0)=""/185, 0xb9}}], 0x2, 0x0, 0x0) 00:24:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) 00:24:36 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r1) r2 = getpid() exit_group(0x0) get_robust_list(r2, &(0x7f0000000000)=0x0, &(0x7f0000000040)) 00:24:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) shutdown(r0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x400201, 0x0) exit_group(0x3) write$smack_current(r1, &(0x7f0000000180)='em0\x00', 0x4) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0}}], 0x57b, 0x0, 0x0) 00:24:36 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x524) r2 = syz_open_pts(r1, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380), 0x1, 0x0, 0x0, 0x800}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x2) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x414, 0x20) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000400)=""/116, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000480), 0x2000000000000113, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000480)='trusted.overlay.upper\x00', &(0x7f00000004c0)={0x0, 0xfb, 0x104, 0x1, 0x7f, "496fe2de13bb2309501d87bc20ff528c", "e6d83c5c4fdbabeeda09962c773ce33bc70ed291673aefbe4222429998deff4141303a7d4f388f53783d8afb2cb18cf3d63bcebfb2951c862f137e4fbfa8002ba57508e45c9fce5a9c0e94d5f6623c67b9f7b1190da0cbbde32368811184a46e673a3f980d8864b08d2de1a0b2098218d210f41f8a09bb0f30b6123328cb8f60de02c861bbff14f4ab9259d883a1f67a6a0e1894233ff8a4aebc16c5cf8ac20862606352e40468149234acce582df6ab1d02d455ddf174574dade874446d34493c37af6d0b62450023327224e6664dbe307f1c1e4d1de04d39bbe993c28ef7db61e7a6a610417058687c4b66abf814"}, 0x104, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}, 0xfffffffffffffffe}], 0x1, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='attr/sockcreate\x00') preadv(r5, &(0x7f0000000900)=[{&(0x7f0000000600)=""/86, 0x56}, {&(0x7f0000000680)=""/137, 0x89}, {&(0x7f0000000740)=""/180, 0xb4}, {&(0x7f0000000800)=""/212, 0xd4}, {&(0x7f00000000c0)=""/1, 0x1}], 0x5, 0x10400003) 00:24:36 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 153.573111] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1000000000000006, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e22, @broadcast}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/22) close(r1) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) fsetxattr$security_smack_transmute(r1, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0xffffffffffffff09, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x200, 0x7f, 0x9, 0x3591}) 00:24:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) 00:24:36 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 153.937900] FAT-fs (loop0): Unrecognized mount option "codepage=4³7" or missing value 00:24:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:37 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) [ 154.542596] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:37 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x30, 0xffffffffffffffff, 0x59) r1 = open(0x0, 0x0, 0x0) munlockall() syz_open_procfs(0x0, 0x0) connect(r1, &(0x7f00000001c0)=@x25={0x9, @null=' \x00'}, 0x80) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0xfff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100000000}, 0x1c) getdents(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0xf, 0x9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:24:37 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f0000000600)=ANY=[@ANYBLOB="f00a7cca3cf8b5cff2f7be23f7000000", @ANYRES16=r2, @ANYBLOB="080025bd7000fedbdf2502000000580005003c000200080002000800000008000200a604000008000400ff0f0000080001000600000008000400fffbffff080004000004000008000200080000000800010069620000080001006574680008000100756470007400050008000100657468002c000200080004000600000008000300f36f0000080002000500000008000200590a000008000400150d00003400020008000300a3e70000080003000700000008000200040000000800030001000080080001000c0000000800020002000000080001007564700008000600040002000800060004000200"], 0xf0}, 0x1, 0x0, 0x0, 0x4880}, 0x8004) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x48, 0x80000001, {"a7a1e9a49c468634c0f2da1dfb7ef8d51424eee2e4bf431b1d7b50dbef6bd7b166197060b16a00cb95b654df2a70"}}, {0x0, "0ed39e8efb91f91d7bc5a1b0d9d6ad30320c9250294a"}}, &(0x7f0000000040)=""/22, 0x60, 0x16, 0x1}, 0x20) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r5, 0x6, 0x4, &(0x7f0000000240)=0xa4f, 0x4) setsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f0000000140), 0x10) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2b", 0x41}], 0x1, 0x0) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f00000005c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="040328bd7000fcdbdf25040000000c00090008000200010000000c0006000800010000040000200002000800010005000000080002007f0000000400040008000200490d0000"], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40040) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) 00:24:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0x1000001a2) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000200)) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) r3 = syz_open_pts(r2, 0x0) readv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1) [ 155.017295] FAT-fs (loop0): Unrecognized mount option "codepage=4³7" or missing value 00:24:38 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) [ 155.285065] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:38 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:38 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:39 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) [ 156.006889] FAT-fs (loop0): Unrecognized mount option "codepage=4³7" or missing value [ 156.199643] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 156.380259] FAT-fs (loop5): Unrecognized mount option "codepage=4³7" or missing value 00:24:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:39 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:39 executing program 5: socket$key(0xf, 0x3, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x3c5) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x30000001}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) fremovexattr(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="8964bc06141857d9b8c216c1188ac4d123f8cbf72d4d4b64966dead1447cc3d9bc0396a55ab62bc3da8ea2943fdb7c659bdc39bd3c5ebfde320422f2742deb8c5dda9ac7ce76a7da1769a21da8bcb3164b6fa2b003081fcd6795b426a86a346a3bfac13454daf8da3ce4ec9fce0389e038905e35b81bccdd10d5703f94976d566a98637a6f089ffd5b23408a9b2a2e95f338488a4668fc13514001064bd6f6bce433301b6fc8655e577c8601c923dbf764fe9b8f6de779a2528c0f0b5c4bb7bd58"]) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r1 = socket(0x11, 0x80000, 0x9fa) accept(r1, &(0x7f0000000040)=@nl, &(0x7f0000000180)=0x80) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x151) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/validatetrans\x00', 0x1, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x5, 0x0) [ 157.052781] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 157.114552] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 157.147995] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 00:24:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 157.188129] attempt to access beyond end of device [ 157.218171] loop5: rw=12288, want=8200, limit=20 00:24:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 157.244317] attempt to access beyond end of device [ 157.263997] loop5: rw=12288, want=12296, limit=20 00:24:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 157.288899] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 157.332574] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 157.339623] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 00:24:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 157.388766] attempt to access beyond end of device [ 157.407233] loop5: rw=12288, want=8200, limit=20 [ 157.424088] attempt to access beyond end of device [ 157.445269] loop5: rw=12288, want=12296, limit=20 [ 157.463786] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 00:24:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:40 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40040}, 0x20000010) 00:24:40 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 157.723379] audit: type=1400 audit(1549499080.690:44): avc: denied { create } for pid=5427 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 00:24:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 157.825648] audit: type=1400 audit(1549499080.700:45): avc: denied { write } for pid=5427 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 00:24:40 executing program 0: r0 = creat(0x0, 0x1) pipe2(&(0x7f00000000c0), 0x80000084000) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000003c0)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x400080, 0x42) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000240)=0x1) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) getpid() recvmmsg(r0, 0x0, 0x0, 0x10143, &(0x7f000000a7c0)) ioctl$GIO_FONTX(r0, 0x4b6b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) r6 = open(0x0, 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r6, 0x0) [ 157.923397] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:41 executing program 0: r0 = creat(0x0, 0x1) pipe2(&(0x7f00000000c0), 0x80000084000) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000003c0)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x400080, 0x42) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000240)=0x1) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) getpid() recvmmsg(r0, 0x0, 0x0, 0x10143, &(0x7f000000a7c0)) ioctl$GIO_FONTX(r0, 0x4b6b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) r6 = open(0x0, 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r6, 0x0) 00:24:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:41 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 158.806238] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:42 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 159.648665] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x41, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) poll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0xff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x807, 0x80) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000240)='net/if_inet6\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) capset(&(0x7f0000000140)={0x19980330, r4}, &(0x7f0000000200)={0x401, 0x12f, 0x1216, 0xffff, 0x3, 0x1}) recvmmsg(r1, &(0x7f00000000c0), 0x284, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) syz_open_pts(r0, 0x4400) 00:24:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:43 executing program 5: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000100), 0x0, 0x0) r0 = inotify_init() write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, 'vmnet1wlan1'}, {0x20, 'logon\x00'}, {0x20, 'logon\x00'}, {0x20, ':eth0/.,)@md5sum[vboxnet0em1'}, {0x20, 'logon\x00'}, {0x20, 'logon\x00'}, {0x20, 'logon\x00'}], 0xa, "a14cbae0cc904739b04be7df83ccdf1d816c79ffef0b281944ba3c9ee8c8950e51aa314bde671b70232d212ba04e51a016d8330370c00b88d696e1dcaa09c9c4afd5f972eb57af561e834232c1e81d0f952e26ca00eb8b0fc9acb5f194f00cda8f816e4f5cfbcef0d6d2919af762a890ed83dbddaf7ba700bd30164762fd46e5f5c0fe784ce50e2ce14bd015e03b8bfc470efa50342bfa5f0ac81fc061865e4f3dbdccde4527ec9cba720502d4b5eb1a94e0606cfb282d37c6c54800fae51b0765afd96335"}, 0x11c) 00:24:43 executing program 5: r0 = socket(0x0, 0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x134000, 0x4) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') getxattr(0x0, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ptrace$getregset(0x4204, r1, 0x0, 0x0) [ 161.005567] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:44 executing program 5: r0 = add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r0) r1 = request_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000480)='id_legacy\x00', 0xfffffffffffffffc) setxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64EXEC\x00', &(0x7f00000001c0)='/dev/loop-control\x00', 0x12, 0x1) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, r1) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x40) r3 = dup(0xffffffffffffffff) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000300)=0x0) ptrace$getenv(0x4201, r4, 0x7fffffff, &(0x7f0000000340)) add_key(0x0, 0x0, &(0x7f0000001a80), 0x0, 0xfffffffffffffff8) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000280)) fsetxattr(r3, &(0x7f0000000380)=@known='trusted.overlay.impure\x00', &(0x7f00000003c0)='id_legacy\x00', 0xa, 0x1) link(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_DEST(r3, 0x0, 0x0) dup3(r3, r3, 0x80000) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000200)={0x6, 0x5, 0x0, 0x1}) unshare(0x20600) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f00000000c0)={0x8, 0xbf}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$read(0xb, r0, &(0x7f0000000200), 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) 00:24:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:44 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x248000, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000000c0)={0x1, 0x800, 0x40, 0x7, 0x6, 0x100}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xf) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000000040)={&(0x7f0000001400)=""/4096, 0x1000}) 00:24:44 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:44 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="14000000220069d73a00d9063f05d4010400000000000000000000000031aad85470475a39a9b8a6a0ae1be9033ad507edd0a5e53ab90b33608afaa1098641163a7abfddfdabbf6f0d8c248e0ae1789f256b18d692c6d6e0e7f7c2d1eff1c9f6882a73d003eb6ea99181b801933e64372ad2457b2f2230791e6ce0208a02cb8b3a169eff78123b8d"], 0x1}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000640)=""/25) r3 = socket$netlink(0x10, 0x3, 0x7) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000240)=0xc) fcntl$setown(r3, 0x8, r4) r5 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r5, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r6 = gettid() sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="22ae1b179ca83213139df0a560aec0fefdca1065f628ab5361a9aec44b8c8a172ddfc83315cb861e79375ee3f02bfec935174b9b621a845c985b11f239b0afb0d7f9108013d5110d667ba02ca03899350d5f527b25fad799ab3700c3f54dc8ac0b8a662f2fa4e6f32884f41c83e1d2abffd31f4be07f8f2b95db133c8e754e8b00776ce4cebacdc30800549098b0ab52d805e5577021ebcd8dbd0d024adb773a8cf2efd12971274a53b449dced2550c89ea29ef9cc775e395e349045b9349423309e6ee7ff6202f677fa01847b2a3834838e028ce3d53283665d4f19435690894a29a18bfc4415c478a2e2a798238c231a", 0xf1}], 0x1}, 0x0) bind(r2, &(0x7f00000007c0)=@isdn={0x22, 0x10000, 0x4, 0x7, 0x3}, 0x43f) r7 = socket$inet(0x10, 0x3, 0x0) gettid() r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, 0x0) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r9, 0x2, 0x0) keyctl$session_to_parent(0x12) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r6, 0xfffffebd, &(0x7f0000000100)={0x4}) getsockopt$inet6_buf(r2, 0x29, 0x2f, &(0x7f0000000680)=""/162, &(0x7f00000003c0)=0xa2) getsockopt$inet_tcp_buf(r2, 0x6, 0x49466560c755c4d1, &(0x7f0000000740)=""/103, &(0x7f0000000400)=0x67) keyctl$instantiate(0xc, r8, 0x0, 0x0, r8) ioctl$sock_ifreq(r7, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x2}) 00:24:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:45 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="14000000220069d73a00d9063f05d4010400000000000000000000000031aad85470475a39a9b8a6a0ae1be9033ad507edd0a5e53ab90b33608afaa1098641163a7abfddfdabbf6f0d8c248e0ae1789f256b18d692c6d6e0e7f7c2d1eff1c9f6882a73d003eb6ea99181b801933e64372ad2457b2f2230791e6ce0208a02cb8b3a169eff78123b8d"], 0x1}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000640)=""/25) r3 = socket$netlink(0x10, 0x3, 0x7) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000240)=0xc) fcntl$setown(r3, 0x8, r4) r5 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r5, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r6 = gettid() sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="22ae1b179ca83213139df0a560aec0fefdca1065f628ab5361a9aec44b8c8a172ddfc83315cb861e79375ee3f02bfec935174b9b621a845c985b11f239b0afb0d7f9108013d5110d667ba02ca03899350d5f527b25fad799ab3700c3f54dc8ac0b8a662f2fa4e6f32884f41c83e1d2abffd31f4be07f8f2b95db133c8e754e8b00776ce4cebacdc30800549098b0ab52d805e5577021ebcd8dbd0d024adb773a8cf2efd12971274a53b449dced2550c89ea29ef9cc775e395e349045b9349423309e6ee7ff6202f677fa01847b2a3834838e028ce3d53283665d4f19435690894a29a18bfc4415c478a2e2a798238c231a", 0xf1}], 0x1}, 0x0) bind(r2, &(0x7f00000007c0)=@isdn={0x22, 0x10000, 0x4, 0x7, 0x3}, 0x43f) r7 = socket$inet(0x10, 0x3, 0x0) gettid() r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, 0x0) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r9, 0x2, 0x0) keyctl$session_to_parent(0x12) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r6, 0xfffffebd, &(0x7f0000000100)={0x4}) getsockopt$inet6_buf(r2, 0x29, 0x2f, &(0x7f0000000680)=""/162, &(0x7f00000003c0)=0xa2) getsockopt$inet_tcp_buf(r2, 0x6, 0x49466560c755c4d1, &(0x7f0000000740)=""/103, &(0x7f0000000400)=0x67) keyctl$instantiate(0xc, r8, 0x0, 0x0, r8) ioctl$sock_ifreq(r7, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x2}) [ 162.119377] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:45 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x22, 0x4, @thr={&(0x7f0000000180)="2f07f04bf8f8692c96aaaa60fbe9e5d1a96aacf106ca79e969ef055420018b9aaf79c5a622570b495429009a91822ca4d672bd0f9e074666d9bedd57698869aaf117e5bc19f2cd783ef8ac10933b608e2f92df568d8f72f7e44e9933a72e62cc152451032551bcf86cef7920017dc828a9249c1c0b2fabaa9d2fe467cfe2dcc83d70656bea5f35db068d687073167fc35d42b8486614f1299a8d462f737e6a4b3cfda7a43332d5d10b167b03e86fa871f9f403bece5ce60ba02bd0ddc3cb4bf8b99e05c394fdb25c76964e", &(0x7f0000000000)="5800a4204f15c192f50aa132c12a658ead244cf4f9b8e592dfab151d44f70342da6ce3875942a3a9241ac3a930cf45ba5a854f"}}, &(0x7f0000000100)=0x0) timer_delete(r1) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x20000802, &(0x7f0000000140)={0x2, 0x10004e23}, 0x68) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 00:24:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000300)) 00:24:45 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x8282, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @loopback}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000300)=@hci={0x1f, r1}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000380)="1ba5e1c3ea7c00e816c78a3bd9ebd4a0cbfe0bf2e46af71656820326a1873fc1cb43d598b4c2b9fd28e20047141fb4f5578b3368af113b4a375f732ac22e046e25d62744b3cd8b8a4954b21c4ead2dbfd9c7abd1b88cc45348bf7a6b4370a347d1b2c4c4aa43f5b0cbb8a37cfa8c7ccab52a5ea7bedf643e0ab1ca1cf2dbd5af8aee710270cd649f8a8b856730c7a976a6b9bc4f22730a36259d2a632b2c85ec9c959b1ba64406eafd80ee3153c1422af227bd531bd67acd17e853037c20aed903bff30d6d57709fcb140ee6ab260a89aee2ec78eb52aa14534d9b", 0xdb}, {&(0x7f0000000480)="33b7fb9e2380d519fd7c45d1a7407b", 0xf}], 0x2, &(0x7f0000000500)=[{0xf8, 0x115, 0x9, "372a15b561448ea95d74db5b0bd95b01ec5935e500e6c900b8c1ecf395279e18fb2e591eb6b41211306af5511945fea4bef3773c204a9d03848c3caca6eb548b6f1273c67e6af0f3ff30679a84e34760b2625b996b9ffd632995f6a19ad92cb5193276e899a6e75dde8a3fcf6ae93ae99777119e9c70476720c886579f4d97e28de3080ba8b1c8bfafe3443a9d8b7a5b4ea8cd5ecc48b936e43114ac95e82748ba5bca228a4cf8755a41b97cfcef7e945c77a48b6bf2dd2c6d329c05339f3f5a37acbd7b9aa2e2c533a63ff4ddb20cc7f57182002d27f1893ab6b077276000d9ead5a8f07a38be"}, {0xd0, 0x11b, 0xffffffffffff0001, "a3d8081d4cff5a296cd3097a3b83b2fc50be37fb5a72344a630690cab1bf29e0ec3ddb9474c002a6acedcf5715539a983c0aa6d99ccd312f2b97e1976fd4e2e4996d7a7814b57a8f676b9551ff5c2c783c755d1ada55685a3f894bf9f611eb3f037761aa097f4789965580951a9b1ab946bba245ed7f73a183eff43f550c61bc3a71e569d16faac7813fbcedbd1899dd5d3c8b3db87d48119d767ae3d4f728c09e0954f317925675e8c2d9cf786bfc623a6d905e29e5e2381f"}], 0x1c8}, 0x50) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x80000001) fcntl$setstatus(r3, 0x4, 0x102803) ioctl$TCXONC(r3, 0x540a, 0x377f433d) write(r3, &(0x7f0000000000)="d5", 0x1) r4 = dup3(r3, r3, 0x80000) ioctl$TIOCMGET(r4, 0x5415, &(0x7f0000000080)) 00:24:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000300)) 00:24:45 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x20001000000003, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) munlockall() write(r1, &(0x7f0000000000)="220000001400070500e80000004c03000208030001000000080002004102fff0f054", 0x22) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000006132be1269105d1ee5ec49538d688902553cabb063dd1661ac7fbb017930da8eb41c499f8ac41e7290bdd66329ffc612f7b1e8325bd825c4188a822f28e32d7655b5705067a3871f043f610e0becbcbfae3ac972cfe4834d"], 0x0) [ 162.838497] netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. [ 162.897514] netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. 00:24:46 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:46 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x20001000000003, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) munlockall() write(r1, &(0x7f0000000000)="220000001400070500e80000004c03000208030001000000080002004102fff0f054", 0x22) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000006132be1269105d1ee5ec49538d688902553cabb063dd1661ac7fbb017930da8eb41c499f8ac41e7290bdd66329ffc612f7b1e8325bd825c4188a822f28e32d7655b5705067a3871f043f610e0becbcbfae3ac972cfe4834d"], 0x0) 00:24:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000300)) [ 163.107763] netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. 00:24:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:46 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x20001000000003, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) munlockall() write(r1, &(0x7f0000000000)="220000001400070500e80000004c03000208030001000000080002004102fff0f054", 0x22) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000006132be1269105d1ee5ec49538d688902553cabb063dd1661ac7fbb017930da8eb41c499f8ac41e7290bdd66329ffc612f7b1e8325bd825c4188a822f28e32d7655b5705067a3871f043f610e0becbcbfae3ac972cfe4834d"], 0x0) 00:24:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 163.226029] netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. 00:24:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0x50, 0x0, &(0x7f0000000040)) prctl$PR_MCE_KILL_GET(0x22) 00:24:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:46 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffff4c, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x173, 0xf913, 0x381b, 0x2, 0x0, 0x4, 0x10000, 0x2, 0x4, 0x3, 0xfffffffffffff9a8, 0x9, 0x0, 0xbd3, 0x4, 0x3ff, 0x8, 0x8001, 0x3, 0x1000, 0x2, 0x4, 0x0, 0x80000000, 0x8ad, 0x1, 0x7, 0x2, 0xffffffff, 0x7, 0x1, 0x9, 0x2, 0x9, 0xc216, 0x7fff, 0x0, 0x6, 0x3, @perf_config_ext={0x9, 0xfffffffffffffffb}, 0x8, 0x4, 0x4, 0x5, 0x6, 0x7f, 0x8}, r3, 0xe, r0, 0x1) 00:24:46 executing program 5: r0 = socket(0xf, 0x5, 0x0) write(r0, &(0x7f00003fe000)="24000000280007003200000800367700fbffffff010000000000bead000000000000ff10", 0x24) 00:24:46 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1}}) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000000f3ffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x0, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x802) io_setup(0x1, &(0x7f0000000100)) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000004c0), 0x0) fallocate(r4, 0x3, 0x1000000005e89, 0x0) sendfile(r2, r2, 0x0, 0x3) unshare(0x40000000) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$void(r2, 0xc0045c79) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000001c0)={0x6c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="006340010000000000000000000000000000000000000000000000fe00000000000000f608db9ae2667bf95a0748794101e421b95a8aef4dcf5285c2ca53fabe8bbd2eec3b600e6b8518c2f5639cf21a0b6c0a722e624e6a715d31692d1946fbcc769ec9a33f05959377430e"], 0x0, 0x0, 0x0}) clock_gettime(0x0, &(0x7f0000003bc0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003c80)=[{{&(0x7f0000000500)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000580)=""/162, 0xfd57}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/101, 0x65}], 0x4, &(0x7f0000000800)=""/91, 0x5b}, 0x2}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000880)=""/148, 0x94}, {&(0x7f0000000940)=""/124, 0x7c}, {&(0x7f00000009c0)=""/9, 0x9}, {&(0x7f0000000a00)=""/108, 0x6c}, {&(0x7f0000000a80)=""/255, 0xff}, {&(0x7f0000000b80)=""/63, 0x3f}, {&(0x7f0000000bc0)=""/81, 0x51}, {&(0x7f0000000c40)=""/157, 0x9d}, {&(0x7f0000000d00)=""/122, 0x7a}], 0x9, &(0x7f0000000e40)=""/197, 0xc5}, 0x10000}, {{&(0x7f0000000f40)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000fc0)=""/220, 0xdc}, {&(0x7f00000010c0)=""/45, 0x2d}, {&(0x7f0000001100)=""/248, 0xf8}, {&(0x7f0000001200)=""/161, 0xa1}, {&(0x7f00000012c0)=""/240, 0xf0}, {&(0x7f00000013c0)=""/150, 0xffffffffffffff7b}, {&(0x7f0000001480)=""/72, 0x48}, {&(0x7f0000001500)=""/91, 0x5b}, {&(0x7f0000001580)=""/74, 0x4a}], 0x9, &(0x7f00000016c0)=""/166, 0xa6}, 0x7}, {{&(0x7f0000001780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001800)=""/47, 0x2f}, {&(0x7f0000001840)=""/111, 0x6f}, {&(0x7f00000018c0)=""/192, 0xc0}, {&(0x7f0000001980)=""/17, 0x11}, {&(0x7f00000019c0)=""/106, 0x6a}], 0x5, &(0x7f0000001ac0)=""/173, 0xad}, 0x7}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001b80)=""/186, 0xba}, {&(0x7f0000001c40)=""/188, 0xbc}, {&(0x7f0000001d00)=""/82, 0x52}], 0x3, &(0x7f0000001dc0)=""/23, 0x17}, 0x4}, {{&(0x7f0000001e00)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001f40), 0x0, &(0x7f0000001f80)=""/48, 0x30}, 0x800}, {{&(0x7f0000001fc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002200)=[{&(0x7f0000002040)=""/49, 0x31}, {&(0x7f0000002080)=""/115, 0x73}, {&(0x7f0000002100)=""/224, 0xe0}], 0x3, &(0x7f0000002240)=""/142, 0x8e}, 0x5}, {{&(0x7f0000002300)=@isdn, 0x80, &(0x7f0000003840)=[{&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/100, 0x64}, {&(0x7f0000003400)=""/172, 0xac}, {&(0x7f00000034c0)=""/124, 0x7c}, {&(0x7f0000003540)=""/124, 0x7c}, {&(0x7f00000035c0)=""/201, 0xc9}, {&(0x7f00000036c0)=""/111, 0x6f}, {&(0x7f0000003740)=""/251, 0xfb}], 0x8, &(0x7f00000038c0)=""/231, 0xe7}, 0x2cd9}], 0x8, 0x40, &(0x7f0000003c00)={r6, r7+30000000}) sendto$packet(r4, &(0x7f0000000340)="7e180977721e63d6862e3bb263aeeed8607e5bf5782fd91e6a202687eea5b3589c53143b4b152778c04577752d1be7d9e6f40cf4927df27234398c606da8404a95870a370eb5ef572d6598d80b29200f326310403221335bf77c585c8349c4b705d8b2ef5b5b77fe0b91727659d87c9b6de2c063beb122dc9e43d9790a113c1104a23aac8f3ddd8fd745cb1d5603e484a5c76c02ab5915a0bad37b7d901c10d6b90bc2e66f37288cceba43b4c102589dd5c0", 0xb2, 0x20000000, &(0x7f0000003c40)={0x11, 0x0, r8, 0x1, 0x3, 0x6, @dev={[], 0x1b}}, 0x14) fcntl$setown(r0, 0x8, r3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) 00:24:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 163.477888] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value [ 163.662992] binder: 5727:5733 unknown command 20996864 [ 163.686643] binder: 5727:5733 ioctl c0306201 200001c0 returned -22 [ 164.229919] binder: 5727:5728 unknown command 20996864 [ 164.235643] binder: 5727:5728 ioctl c0306201 200001c0 returned -22 00:24:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 00:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:47 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 00:24:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:47 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1}}) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000000f3ffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x0, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x802) io_setup(0x1, &(0x7f0000000100)) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000004c0), 0x0) fallocate(r4, 0x3, 0x1000000005e89, 0x0) sendfile(r2, r2, 0x0, 0x3) unshare(0x40000000) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$void(r2, 0xc0045c79) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000001c0)={0x6c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="006340010000000000000000000000000000000000000000000000fe00000000000000f608db9ae2667bf95a0748794101e421b95a8aef4dcf5285c2ca53fabe8bbd2eec3b600e6b8518c2f5639cf21a0b6c0a722e624e6a715d31692d1946fbcc769ec9a33f05959377430e"], 0x0, 0x0, 0x0}) clock_gettime(0x0, &(0x7f0000003bc0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003c80)=[{{&(0x7f0000000500)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000580)=""/162, 0xfd57}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/101, 0x65}], 0x4, &(0x7f0000000800)=""/91, 0x5b}, 0x2}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000880)=""/148, 0x94}, {&(0x7f0000000940)=""/124, 0x7c}, {&(0x7f00000009c0)=""/9, 0x9}, {&(0x7f0000000a00)=""/108, 0x6c}, {&(0x7f0000000a80)=""/255, 0xff}, {&(0x7f0000000b80)=""/63, 0x3f}, {&(0x7f0000000bc0)=""/81, 0x51}, {&(0x7f0000000c40)=""/157, 0x9d}, {&(0x7f0000000d00)=""/122, 0x7a}], 0x9, &(0x7f0000000e40)=""/197, 0xc5}, 0x10000}, {{&(0x7f0000000f40)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000fc0)=""/220, 0xdc}, {&(0x7f00000010c0)=""/45, 0x2d}, {&(0x7f0000001100)=""/248, 0xf8}, {&(0x7f0000001200)=""/161, 0xa1}, {&(0x7f00000012c0)=""/240, 0xf0}, {&(0x7f00000013c0)=""/150, 0xffffffffffffff7b}, {&(0x7f0000001480)=""/72, 0x48}, {&(0x7f0000001500)=""/91, 0x5b}, {&(0x7f0000001580)=""/74, 0x4a}], 0x9, &(0x7f00000016c0)=""/166, 0xa6}, 0x7}, {{&(0x7f0000001780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001800)=""/47, 0x2f}, {&(0x7f0000001840)=""/111, 0x6f}, {&(0x7f00000018c0)=""/192, 0xc0}, {&(0x7f0000001980)=""/17, 0x11}, {&(0x7f00000019c0)=""/106, 0x6a}], 0x5, &(0x7f0000001ac0)=""/173, 0xad}, 0x7}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001b80)=""/186, 0xba}, {&(0x7f0000001c40)=""/188, 0xbc}, {&(0x7f0000001d00)=""/82, 0x52}], 0x3, &(0x7f0000001dc0)=""/23, 0x17}, 0x4}, {{&(0x7f0000001e00)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001f40), 0x0, &(0x7f0000001f80)=""/48, 0x30}, 0x800}, {{&(0x7f0000001fc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002200)=[{&(0x7f0000002040)=""/49, 0x31}, {&(0x7f0000002080)=""/115, 0x73}, {&(0x7f0000002100)=""/224, 0xe0}], 0x3, &(0x7f0000002240)=""/142, 0x8e}, 0x5}, {{&(0x7f0000002300)=@isdn, 0x80, &(0x7f0000003840)=[{&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/100, 0x64}, {&(0x7f0000003400)=""/172, 0xac}, {&(0x7f00000034c0)=""/124, 0x7c}, {&(0x7f0000003540)=""/124, 0x7c}, {&(0x7f00000035c0)=""/201, 0xc9}, {&(0x7f00000036c0)=""/111, 0x6f}, {&(0x7f0000003740)=""/251, 0xfb}], 0x8, &(0x7f00000038c0)=""/231, 0xe7}, 0x2cd9}], 0x8, 0x40, &(0x7f0000003c00)={r6, r7+30000000}) sendto$packet(r4, &(0x7f0000000340)="7e180977721e63d6862e3bb263aeeed8607e5bf5782fd91e6a202687eea5b3589c53143b4b152778c04577752d1be7d9e6f40cf4927df27234398c606da8404a95870a370eb5ef572d6598d80b29200f326310403221335bf77c585c8349c4b705d8b2ef5b5b77fe0b91727659d87c9b6de2c063beb122dc9e43d9790a113c1104a23aac8f3ddd8fd745cb1d5603e484a5c76c02ab5915a0bad37b7d901c10d6b90bc2e66f37288cceba43b4c102589dd5c0", 0xb2, 0x20000000, &(0x7f0000003c40)={0x11, 0x0, r8, 0x1, 0x3, 0x6, @dev={[], 0x1b}}, 0x14) fcntl$setown(r0, 0x8, r3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) 00:24:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) [ 164.619621] binder: 5759:5767 unknown command 20996864 00:24:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 164.642417] binder: 5759:5767 ioctl c0306201 200001c0 returned -22 [ 164.673341] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000300)) 00:24:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:48 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:48 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1}}) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000000f3ffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x0, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x802) io_setup(0x1, &(0x7f0000000100)) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000004c0), 0x0) fallocate(r4, 0x3, 0x1000000005e89, 0x0) sendfile(r2, r2, 0x0, 0x3) unshare(0x40000000) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$void(r2, 0xc0045c79) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000001c0)={0x6c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="006340010000000000000000000000000000000000000000000000fe00000000000000f608db9ae2667bf95a0748794101e421b95a8aef4dcf5285c2ca53fabe8bbd2eec3b600e6b8518c2f5639cf21a0b6c0a722e624e6a715d31692d1946fbcc769ec9a33f05959377430e"], 0x0, 0x0, 0x0}) clock_gettime(0x0, &(0x7f0000003bc0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003c80)=[{{&(0x7f0000000500)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000580)=""/162, 0xfd57}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/101, 0x65}], 0x4, &(0x7f0000000800)=""/91, 0x5b}, 0x2}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000880)=""/148, 0x94}, {&(0x7f0000000940)=""/124, 0x7c}, {&(0x7f00000009c0)=""/9, 0x9}, {&(0x7f0000000a00)=""/108, 0x6c}, {&(0x7f0000000a80)=""/255, 0xff}, {&(0x7f0000000b80)=""/63, 0x3f}, {&(0x7f0000000bc0)=""/81, 0x51}, {&(0x7f0000000c40)=""/157, 0x9d}, {&(0x7f0000000d00)=""/122, 0x7a}], 0x9, &(0x7f0000000e40)=""/197, 0xc5}, 0x10000}, {{&(0x7f0000000f40)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000fc0)=""/220, 0xdc}, {&(0x7f00000010c0)=""/45, 0x2d}, {&(0x7f0000001100)=""/248, 0xf8}, {&(0x7f0000001200)=""/161, 0xa1}, {&(0x7f00000012c0)=""/240, 0xf0}, {&(0x7f00000013c0)=""/150, 0xffffffffffffff7b}, {&(0x7f0000001480)=""/72, 0x48}, {&(0x7f0000001500)=""/91, 0x5b}, {&(0x7f0000001580)=""/74, 0x4a}], 0x9, &(0x7f00000016c0)=""/166, 0xa6}, 0x7}, {{&(0x7f0000001780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001800)=""/47, 0x2f}, {&(0x7f0000001840)=""/111, 0x6f}, {&(0x7f00000018c0)=""/192, 0xc0}, {&(0x7f0000001980)=""/17, 0x11}, {&(0x7f00000019c0)=""/106, 0x6a}], 0x5, &(0x7f0000001ac0)=""/173, 0xad}, 0x7}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001b80)=""/186, 0xba}, {&(0x7f0000001c40)=""/188, 0xbc}, {&(0x7f0000001d00)=""/82, 0x52}], 0x3, &(0x7f0000001dc0)=""/23, 0x17}, 0x4}, {{&(0x7f0000001e00)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001f40), 0x0, &(0x7f0000001f80)=""/48, 0x30}, 0x800}, {{&(0x7f0000001fc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002200)=[{&(0x7f0000002040)=""/49, 0x31}, {&(0x7f0000002080)=""/115, 0x73}, {&(0x7f0000002100)=""/224, 0xe0}], 0x3, &(0x7f0000002240)=""/142, 0x8e}, 0x5}, {{&(0x7f0000002300)=@isdn, 0x80, &(0x7f0000003840)=[{&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/100, 0x64}, {&(0x7f0000003400)=""/172, 0xac}, {&(0x7f00000034c0)=""/124, 0x7c}, {&(0x7f0000003540)=""/124, 0x7c}, {&(0x7f00000035c0)=""/201, 0xc9}, {&(0x7f00000036c0)=""/111, 0x6f}, {&(0x7f0000003740)=""/251, 0xfb}], 0x8, &(0x7f00000038c0)=""/231, 0xe7}, 0x2cd9}], 0x8, 0x40, &(0x7f0000003c00)={r6, r7+30000000}) sendto$packet(r4, &(0x7f0000000340)="7e180977721e63d6862e3bb263aeeed8607e5bf5782fd91e6a202687eea5b3589c53143b4b152778c04577752d1be7d9e6f40cf4927df27234398c606da8404a95870a370eb5ef572d6598d80b29200f326310403221335bf77c585c8349c4b705d8b2ef5b5b77fe0b91727659d87c9b6de2c063beb122dc9e43d9790a113c1104a23aac8f3ddd8fd745cb1d5603e484a5c76c02ab5915a0bad37b7d901c10d6b90bc2e66f37288cceba43b4c102589dd5c0", 0xb2, 0x20000000, &(0x7f0000003c40)={0x11, 0x0, r8, 0x1, 0x3, 0x6, @dev={[], 0x1b}}, 0x14) fcntl$setown(r0, 0x8, r3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) 00:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000300)) 00:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000300)) 00:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 165.579718] binder: 5799:5807 unknown command 20996864 [ 165.606180] binder: 5799:5807 ioctl c0306201 200001c0 returned -22 00:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 00:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) [ 165.845085] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 00:24:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:24:49 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1}}) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000000f3ffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x0, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x802) io_setup(0x1, &(0x7f0000000100)) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000004c0), 0x0) fallocate(r4, 0x3, 0x1000000005e89, 0x0) sendfile(r2, r2, 0x0, 0x3) unshare(0x40000000) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$void(r2, 0xc0045c79) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000001c0)={0x6c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="006340010000000000000000000000000000000000000000000000fe00000000000000f608db9ae2667bf95a0748794101e421b95a8aef4dcf5285c2ca53fabe8bbd2eec3b600e6b8518c2f5639cf21a0b6c0a722e624e6a715d31692d1946fbcc769ec9a33f05959377430e"], 0x0, 0x0, 0x0}) clock_gettime(0x0, &(0x7f0000003bc0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003c80)=[{{&(0x7f0000000500)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000580)=""/162, 0xfd57}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/101, 0x65}], 0x4, &(0x7f0000000800)=""/91, 0x5b}, 0x2}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000880)=""/148, 0x94}, {&(0x7f0000000940)=""/124, 0x7c}, {&(0x7f00000009c0)=""/9, 0x9}, {&(0x7f0000000a00)=""/108, 0x6c}, {&(0x7f0000000a80)=""/255, 0xff}, {&(0x7f0000000b80)=""/63, 0x3f}, {&(0x7f0000000bc0)=""/81, 0x51}, {&(0x7f0000000c40)=""/157, 0x9d}, {&(0x7f0000000d00)=""/122, 0x7a}], 0x9, &(0x7f0000000e40)=""/197, 0xc5}, 0x10000}, {{&(0x7f0000000f40)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000fc0)=""/220, 0xdc}, {&(0x7f00000010c0)=""/45, 0x2d}, {&(0x7f0000001100)=""/248, 0xf8}, {&(0x7f0000001200)=""/161, 0xa1}, {&(0x7f00000012c0)=""/240, 0xf0}, {&(0x7f00000013c0)=""/150, 0xffffffffffffff7b}, {&(0x7f0000001480)=""/72, 0x48}, {&(0x7f0000001500)=""/91, 0x5b}, {&(0x7f0000001580)=""/74, 0x4a}], 0x9, &(0x7f00000016c0)=""/166, 0xa6}, 0x7}, {{&(0x7f0000001780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001800)=""/47, 0x2f}, {&(0x7f0000001840)=""/111, 0x6f}, {&(0x7f00000018c0)=""/192, 0xc0}, {&(0x7f0000001980)=""/17, 0x11}, {&(0x7f00000019c0)=""/106, 0x6a}], 0x5, &(0x7f0000001ac0)=""/173, 0xad}, 0x7}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001b80)=""/186, 0xba}, {&(0x7f0000001c40)=""/188, 0xbc}, {&(0x7f0000001d00)=""/82, 0x52}], 0x3, &(0x7f0000001dc0)=""/23, 0x17}, 0x4}, {{&(0x7f0000001e00)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001f40), 0x0, &(0x7f0000001f80)=""/48, 0x30}, 0x800}, {{&(0x7f0000001fc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002200)=[{&(0x7f0000002040)=""/49, 0x31}, {&(0x7f0000002080)=""/115, 0x73}, {&(0x7f0000002100)=""/224, 0xe0}], 0x3, &(0x7f0000002240)=""/142, 0x8e}, 0x5}, {{&(0x7f0000002300)=@isdn, 0x80, &(0x7f0000003840)=[{&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/100, 0x64}, {&(0x7f0000003400)=""/172, 0xac}, {&(0x7f00000034c0)=""/124, 0x7c}, {&(0x7f0000003540)=""/124, 0x7c}, {&(0x7f00000035c0)=""/201, 0xc9}, {&(0x7f00000036c0)=""/111, 0x6f}, {&(0x7f0000003740)=""/251, 0xfb}], 0x8, &(0x7f00000038c0)=""/231, 0xe7}, 0x2cd9}], 0x8, 0x40, &(0x7f0000003c00)={r6, r7+30000000}) sendto$packet(r4, &(0x7f0000000340)="7e180977721e63d6862e3bb263aeeed8607e5bf5782fd91e6a202687eea5b3589c53143b4b152778c04577752d1be7d9e6f40cf4927df27234398c606da8404a95870a370eb5ef572d6598d80b29200f326310403221335bf77c585c8349c4b705d8b2ef5b5b77fe0b91727659d87c9b6de2c063beb122dc9e43d9790a113c1104a23aac8f3ddd8fd745cb1d5603e484a5c76c02ab5915a0bad37b7d901c10d6b90bc2e66f37288cceba43b4c102589dd5c0", 0xb2, 0x20000000, &(0x7f0000003c40)={0x11, 0x0, r8, 0x1, 0x3, 0x6, @dev={[], 0x1b}}, 0x14) fcntl$setown(r0, 0x8, r3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) 00:24:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:24:49 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:24:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 166.888637] binder: 5856:5870 unknown command 20996864 [ 166.911398] binder: 5856:5870 ioctl c0306201 200001c0 returned -22 [ 167.135209] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:50 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:50 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000200)=""/18, 0x12}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x4000) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000001c0)) write$P9_RXATTRCREATE(r1, &(0x7f0000000440)={0x7, 0x21, 0x1}, 0x7) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x11, 0x10000004) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) mknodat(r1, &(0x7f0000000240)='./file1\x00', 0x800, 0x9) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6tnl0\x00') r3 = openat$cgroup_int(r2, &(0x7f0000000680)='cgroup.max.descendants\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000280)={{0xfffffffffffff591, 0x4, 0xfffffffffffffffc, 0x4a4c}, 'syz1\x00', 0x1e}) clock_getres(0x0, 0x0) 00:24:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x80800) io_setup(0x6, &(0x7f0000000100)=0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000000)={0x64, 0x5030, 0x2}) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 00:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 167.697760] FAT-fs (loop0): Unrecognized mount option "codepage=4³7" or missing value 00:24:51 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:51 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20, 0x12e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x87) 00:24:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000140)) syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x201, 0x28) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) 00:24:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:51 executing program 5: socketpair(0x1, 0x0, 0xd1f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x4d8, 0x118, 0x370, 0x370, 0x240, 0x0, 0x440, 0x440, 0x440, 0x440, 0x440, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe0, 0x118, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x800}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x10, @rand_addr=0x8, @multicast2, @icmp_id=0x65, @icmp_id=0x67}}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1f}, 0x0, 0xff000000, 'vcan0\x00', 'bond_slave_1\x00', {}, {0xff}, 0x3f, 0x1, 0x10}, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x200, 0x800, 0x1, 0x1}}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x2, 0x3}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @loopback, @empty, @icmp_id=0x66, @port=0x4e23}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x26}, @multicast2, 0xffffff00, 0xffffff00, 'veth0_to_hsr\x00', 'veth1_to_bridge\x00', {0xff}, {}, 0x16, 0x3, 0x40}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xe, 0xff, 0x6, 0x1}}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x5}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key=0x4, @gre_key=0x80000001}}}, {{@uncond, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0xa, @dev={0xac, 0x14, 0x14, 0x22}, @multicast2, @port=0x4e21, @gre_key=0xff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x1ce2ff}]}, &(0x7f0000003ff6)='GPL\x00'}, 0x48) 00:24:51 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x100, 0x4) r0 = dup(0xffffffffffffff9c) sendmmsg(r0, &(0x7f0000003d00)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="4b058f5fbea8e16f0382ea9121467316cea1bf71fb3448555f78b445bbfa7274cc15e8859488f8a6bb495699fa6583234013338c56e6e68d5193f12fc48016b6db5d00a78f0f5d7fcdc60e0b1e685ba0d770bca2281874fedea490474d9c1c90e0c5f9a58d3391436555cb8f8a58e33e67bc428c4eb04088c782bd9446854cbf", 0x80}, {&(0x7f00000000c0)="6534724f51e17657a7b13ffe6ee4ff5c4157353e92ffd4dcd6cb4cc1298115fee378239c6424360004bd973750d8a6c815f3a9ffbe80e1c7287e4e26aef13a7d0aa08571e9e1cfa0073ea693a86ff74a65cc468d8fc39c6944fd201f21b6937c1818a6bbbae3adbdb655330a252a2e533f36b4c022bcc7553d217432545d851492a045d9ea638eb7709b5b015b40a2f9b25ea76a9e337a0db30937386969919ec585ee0fc165a61c4a2dbaf03dda244bda64fea624ec6e771df77bb94333f253a5ff515ed10ec7dcdf765b2d33e622a21ef3c76a10e59c9365e0804ac0f64f1c221b3904789c2966aa", 0xe9}], 0x2, &(0x7f0000000200)=[{0x110, 0x11f, 0x7, "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"}, {0x110, 0x29, 0x7, "f7f29ab017c851fda5de6349801ebc54eb051879626ec142ba58622ce9a90cb17a9d9e1cecabde8ea523dbbe7df352bab98c39950c50c5b95e800283bb6d08a2280505011e0c7f6c4630d542bf4abbdbbc1fbd27f152eade551465574db3a98fc85aaa24ab1355c542cf9d6876870e503d96190e2d35dcfa808cd654077118ee1492c22665fecc51d7b60cd68fbbdb6cd54fd668808d3fa2e47aa113f97e0cd5fccb89a8a11605ff033196045f4f7da85e082fe9f9c3b053c2f6575ab987d8aed7663888954f31f8928cb61cbbf0aecf4d4b2dd69805761807eb124bb206d9de62ba85780c9392f03bad42c99a1c1b3128e00932736ae8a184"}, {0x58, 0x1, 0x7, "066525f3090c9b9cdc94b6c98419d45bf041d50336c81b9d5a1d8cb4100ff9ea57774a71359d2130b3905fcfcbafd06e65092dd14872f485a4267e73436fddd5c53d0da97a2b"}, {0x10, 0x19f}, {0x1010, 0x0, 0x80000001, "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"}, {0x98, 0x10e, 0x9, "c196849a408fff290643e8aa5b718350ae762bacdc1722dadcf357a77bb544e9d227149d630c005601c56d646ab80940638bd11795f94b38fbf54ce23c0f35226deecd189d2af498aee9f4e28d39c7bb5e30a7e495c832dd255c901224305fcc650f96e44cd042c16ab14e61ea978965d68d1112272c7ec21b1d16c17f7060b8a023b0ff0b"}], 0x1330}, 0x4}, {{&(0x7f0000001540)=@ipx={0x4, 0x8, 0x3, "edf6e14b1beb", 0x401}, 0x80, &(0x7f0000002740)=[{&(0x7f00000015c0)="03ddc7e445976c2a04246f2d9053bfa51cd4c2b31899b81a17b6d777743d02ddee10d863b6ff6cc6bb1b2d22f52680454835b7affc3afcf20eb67c7e87d70bf87c608294ee04369f0d70c4232bff9db57915b814450b3ca752fe359491b3ea9f4533688d03af1f157ab3a279aee657c18368ce77efdd9d4525", 0x79}, {&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000002640)="c6009f3c1f3da1f68ff13e89a193f5146612f47154ce674c9b8d4af25c4f6aba0d3ac2503a885b5fc66a749f817208acb001c08a8d36407f0f834af6fd2431275f2608fd7b2f31b16cc9a44980eb3936cb7403d62c1863591467ca681e4c696b94cec5188c28a21dd211bac6cab2bf3c6c31a6039b7dd7e645d401be2d6ea0904642d7e43f045804520cdac07b75f0a293e0f9327a1a032e2fc99bb43e", 0x9d}, {&(0x7f0000002700)='M', 0x1}], 0x4, &(0x7f0000002780)=[{0xb8, 0x111, 0x8, "ea7eb16266c1c91a061cb3d33c27454e93dd3a2c5f57877924da53a7a9b40ac3daa88129a9eddbe7ab62841d46a0118be94972370035527c02771f0f0947b353d5ea9a3f726911e0cf8f1a66fe5b26501335c79a779dbefc110de0082453ed3deea19438dadb438ec2df0e22c4aeb63860d0441376282991403d415134d1daa8bb8f2a33c88283d88b1ce5a804ab646453092f1a706b22378b82143704d85c6ec591580b7ac3e8"}, {0x20, 0x11f, 0x1, "4dfd484dfa75ceab71"}], 0xd8}, 0x81}, {{&(0x7f0000002880)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x4, @mcast1, 0xffffffffffffff7f}}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000002900)="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", 0x1000}, {&(0x7f0000003900)="23c88f37c30c5ddbe255fafb4a972247354c942979b568addae3b211be82637bf61df49bf54a9ff517dad934a0667e33c48a8041673fcf4a233d2bbf9e717e59e0c7efcd80091896d1ddd703dc31f47b603bc5fe2f478a649b7694e781043a93baba28bc0fb2962c3c0f562f4f64530725e7", 0x72}, {&(0x7f0000003980)="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", 0xfd}, {&(0x7f0000003a80)="d85f1c68d33ef01d5c927336c124c8745fd7708d3126ac24d2b1c78d8ea217dde13f90fbe05074b3f9034b8f960339172cf9e1ce0082568ceafe2e4f1bdbb68db884de786265a6e73bbfd3b2784e23205df63fceee25f6d6b8136683de3b90b960189b38dcaf0a59e2f1d19953ed3ab8731c905803c853edaf25c058157d7939ac83a4fc4c4d4dcea5348965c1a35b7560482eb5e3e273d75fd3273b64bbaf", 0x9f}, {&(0x7f0000003b40)="60443b680c263c57f750d82c62d9e14d6a35cb486f8cb6c680b8e65989a88a9e8d3f2bddf549a3e0717d23be2c9a9cca2222acf171dd75218e6f8bdef4779004f8ec97d059866b2716b79614d0afa7ad12f45462604d9a3ba7fe126b88da2bf5fe65d92098ce1c674eacd92ed50e3ece76f74108df579c8f57fdb7028b0844aafaadb9f1c51ea32c928f7c5c2321f677106ed2e32ca6a874648654953281a191955763e8045bc67db8e978d7ea69", 0xae}], 0x5, &(0x7f0000003c80)=[{0x80, 0x117, 0x8000, "6ef5337b7199122207f8b3da90faf07a1200d75dd6f87a037df8bc714a8219e822ebb825d00475ebfca3c98909b6be650a2c1cf2f4591ac05657dece80f69330c4b018cb9b3680fc9031be6bd0354f8df4d877f31b20d0a4ae8dabaf2084f5ae4078f49ebf7f5ebadc6f"}], 0x80}, 0x7fff}], 0x3, 0x20000081) unlink(&(0x7f0000003dc0)='./file0\x00') write$P9_RLCREATE(r0, &(0x7f0000003e00)={0x18, 0xf, 0x1, {{0x80, 0x1, 0x5}}}, 0x18) r1 = dup2(r0, r0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x5) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000003e80)={0x3, &(0x7f0000003e40)=[{0x9, 0x100000000, 0x15, 0x5251}, {0x2, 0x2, 0x2, 0x1000}, {0x7fffffff, 0x59, 0x6, 0x4}]}) prctl$PR_GET_SECCOMP(0x15) add_key$keyring(&(0x7f0000003ec0)='keyring\x00', &(0x7f0000003f00)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000003f40)=0x0) waitid(0x2, r2, &(0x7f0000003f80), 0xa, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000004000)={0x40, 0x8}) write$binfmt_misc(r0, &(0x7f0000004040)={'syz0', "9a45e203b9b9a826915fea2af2e564c04377e9e8a57f589a40567f2909561da417f026047f06f0910d380ff7b59da661efb0a68f1053a22579b2967f26fe9c5a3d68cbd1d1f866126c0edf9dc84050a02c7d91c8964d7f4e5a6f92b3f205fb6e23174c05431fc6ad7c5ed803da6e4ffac21fd9fa034287f401bf6cbec390674ff85db8c1"}, 0x88) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x9, &(0x7f0000004100)=""/17) r3 = openat$cgroup_ro(r0, &(0x7f0000004140)='memory.events\x00', 0x0, 0x0) fallocate(r0, 0x4, 0x20000, 0x100000001) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000004180)=0x0) r5 = creat(&(0x7f00000041c0)='./file0\x00', 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004200)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004300)=0xe8) getresgid(&(0x7f0000004340)=0x0, &(0x7f0000004380), &(0x7f00000043c0)) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000004400)={r2, r6, r7}, 0xc) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000004440)={0x4, 0x9, 0xfffffffffffffffa, 0x401, 0x17, 0x200, 0x9, 0x0, 0x8001, 0x0, 0xb5, 0x10001}) futimesat(r1, &(0x7f0000004480)='./file0\x00', &(0x7f00000044c0)={{}, {0x77359400}}) sendmsg$nl_netfilter(r1, &(0x7f0000004a80)={&(0x7f0000004500)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004a40)={&(0x7f0000004540)={0x4dc, 0x6, 0xf, 0x400, 0x70bd2b, 0x25dfdbfe, {0xa, 0x0, 0x2}, [@nested={0x1c8, 0x8a, [@generic="fe39d5ad5f4936b24d7000c06c652d7ff8354a9dc3b9d5b96b4aa30df33fc4ccc30670c3cbe023750ef1c75dbd9f7867367218679c94cf21bdf8cd5b6336e8ffd826a28d6eac2eb4b3f07eb015b96e371b57fc8fb5a16635b2a76c4b59", @typed={0xc, 0x45, @str='keyring\x00'}, @typed={0x14, 0x33, @ipv6=@dev={0xfe, 0x80, [], 0x13}}, @generic="f544d5fa2245941a641b419556f7fb09afda11e3554022aa608e1a8ccc429c35ad3fefdea73411f2a8aa3f0235c01f4229120bc204531450646abf220f5fe888e4b7064eed706895a5ac349a31f7", @typed={0x14, 0x13, @ipv6=@empty}, @generic="9fc88e3be993a48e8a923a85ef1f4f2d1224e7f08edad0c79f17137fc4ec476bc170637fba044535150c944f2d4509a49045dc0a2f3073160a3e52c5c9", @generic="c55ca2c02c0dc901bc0559fc89fde0ea42083028fefd9513eeaee7e3100bb3e2928e9fd4e7f5a1cc0c993a870f6d1ca92389d0e12ab790ebca85e15c90e72d44c13fc245488abdeac3a37fe8b7e8b5d9a4ae864b7c439a616e5402a2e5f8e1e03ad7df7790db85b486ce68cb246ceaa6a785189e86763f0d5867f293377eed421b792cee57c908df2300a9c3934eea1fde564afff438af7c697df2eaa231e03adc0e4d0cc0"]}, @typed={0xc, 0x17, @u64=0x8a9}, @nested={0xc, 0x55, [@typed={0x8, 0x55, @u32=0x9}]}, @generic="bd2adf4b4ae5188ca80f4cd9bba2e19af5c43e20ca6389f2be73e2082699661e6d380cc42577b07ed58bcdace897ffaa32f0f0ae6ed3b58221e598bf81b21a4e0148a2a15b0b71d5339bf8cb0b90a637b76a91dc16e0ef6f7f09107d4ccfab75db9238d839ac647f634d71ab20f07f605a3c0c7b23812e4224740127831a323e46767a738c324609f72318429bb43254ab6fae5d1ad0ee8a36d9253a", @generic="a9c3c204afe6d03eed98242ced04dae48b08", @nested={0xe0, 0x6d, [@generic="ec9a70cf2d1d6d07dec24d5a1c00c022048b861308f26c3f91454e2adb022404f5ae032b4bff3d250698d327f15c0f1d96cc8e5a6c9ab73ec53ddcea83d1a3cda04cd0c7702bfb55acf164cd30a5b961b649f621e88092587b86b680eaad4b8cd9f8faff3f0c8d9bfe8077361d77fdd1de8f476cacae5c678423783d157d3cacdfcd22e8409d92e82788dab4bba614278ba01030dd449e1564be2d3350fbb0f564ca8f79cda5bbc0371f2023fd11bcf2e19c039b58f3b0aab4795a06fa4e368805eb81e986", @typed={0x8, 0x47, @fd=r1}, @typed={0xc, 0x59, @u64=0x1}]}, @generic="9d24880d1e2913c68c5650a483cdc5e0baa5bd6674144700352c0946aa6dc7fccda4fad8b5d0006309aed9331575a72af2a165cd43d3e875fba8390d5f853506a1ff9950ccc0fa06e52f86e2a2dbdbc3da8c673bf215c9fac43d51a6f8f311f64b1ea4ce7dba4f910fbcc6fdb6c7f40435cff20d91c3f3a381959f4121dcb842d4e504a9", @nested={0xd4, 0x7b, [@generic="63deb3ade6088803ee78f319932ea69e9f2129112f7dc7ddf327af424434ba389ff7b495d50d8e43d2526bec5a16f5d14724b197e8d63295a6baa3ea59dc56977a341a27", @typed={0x8, 0x87, @u32=0x3}, @generic="25429dfaf96979f599efbc3bd5d387f1ee3505079a272186ae2f29a58f73aa027f3502e55c697dd0ca8ebf76884e8dada2d4dcc99fee59c42f8951e84d292d2c50de57f475a23d42a82dc8d8afec71cecc7df2e80e47da842166655b7e9e4e0ae40082752793e5aa0554dd4e0f6ce0c63ab258df6abec8e9df6cb3e1c973e8067a"]}]}, 0x4dc}, 0x1, 0x0, 0x0, 0x80}, 0x4040004) ioctl$PPPIOCDISCONN(r0, 0x7439) ioctl$TCSETS(r3, 0x5402, &(0x7f0000004ac0)={0x4, 0x5, 0x9124, 0x6, 0x5, 0x6, 0x40, 0x10001, 0x2bbb18ed, 0xfff, 0x7e00000000000, 0xa4}) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000004b00)={{0xa, 0x4e24, 0xffffffff, @mcast1, 0x465}, {0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xf1}, 0x0, [0x4, 0x4, 0xff, 0x4, 0x9, 0x80, 0x8]}, 0x5c) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x5, &(0x7f0000004b80)=""/37) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) 00:24:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 168.693103] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:52 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:52 executing program 5: setxattr$trusted_overlay_upper(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="00fbe70406c47cbf41892082227a2021044914a6ed0781c3e94fa33c964f94a4e78181c0361bfe08b933f64dafdd98a5384a091fc2c24612968db27b196404b9fd7bb61669dea2489b777b813a5a703f324ae8bd652c1583876ebfae5976ab3eb1b4f8e92edb68465a22ec0c88fec897e31fb359ad8bb9429e8c002b495b253b2c536bd604f6d2159cc29f57a2ab3cd484c88be6283a8b6b8a6cb94da514feaa6a45b09ef02103b78826650e1ed18b4884545e911a5e9ee4383d7f9531e7189cb7f423f7a49b56c35e15f4b7e78dc03bf901feeda755633c73a8851cf42c2f615c081db4e5afd20391f0"], 0x1, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) keyctl$join(0x1, 0x0) unshare(0x40040200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000001c0)=0xd84, 0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'ipddp0\x00', 0x200}) clock_nanosleep(0x4, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000180)) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1f) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r4, &(0x7f0000000140)="0833fbd2be6c825fb5662fa6b2bb9ff0007f5ae42a18eee7eea768890d92d5f553d174f74f96baf55ac42bae5ac5ba5211f61eb34c359d404fa0ad48a7ca3ac0e4b9af60a28caab0fc1cac4fadcda97f8646b61313a68545025eaf38d9d1cafb1dac03308442835abeda1f9d723d06486788c1656a47b916e731f560ca31b597e89d18c830f474e05b7bf07b367cfb0bf7eba48016c0bd0ec9c3e7afa7c6631cc610bbb9e29b", 0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x9, &(0x7f0000000540)=ANY=[@ANYBLOB="b40000000000da00d3b106000000000000000000e3ff0000950000007f3f09005e4e73a6ef5f4cd96a28d2540eb450703576235edd88651cc5763754c1f1187f05396ed7fce09065af0200a3339f777d2325348866805c898c6cacd2ac9168d358dc6ba5f614198e633a79c18319a66def805ed7d7fe8380b1017f61a190661a2cb4e71689ea05b3a169c24ec1742c506de1f6c7e1a06814082d6993bd492173dca0836a13896e6aa696760561ae842e220d00d763edccb40b1169d80bad47793fdd308281cd914f50b1a5"], 0x0, 0x5}, 0x48) 00:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:24:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 169.454791] FAT-fs (loop0): Unrecognized mount option "codepage=4³7" or missing value 00:24:52 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:24:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:53 executing program 5: setxattr$trusted_overlay_upper(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="00fbe70406c47cbf41892082227a2021044914a6ed0781c3e94fa33c964f94a4e78181c0361bfe08b933f64dafdd98a5384a091fc2c24612968db27b196404b9fd7bb61669dea2489b777b813a5a703f324ae8bd652c1583876ebfae5976ab3eb1b4f8e92edb68465a22ec0c88fec897e31fb359ad8bb9429e8c002b495b253b2c536bd604f6d2159cc29f57a2ab3cd484c88be6283a8b6b8a6cb94da514feaa6a45b09ef02103b78826650e1ed18b4884545e911a5e9ee4383d7f9531e7189cb7f423f7a49b56c35e15f4b7e78dc03bf901feeda755633c73a8851cf42c2f615c081db4e5afd20391f0"], 0x1, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) keyctl$join(0x1, 0x0) unshare(0x40040200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000001c0)=0xd84, 0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'ipddp0\x00', 0x200}) clock_nanosleep(0x4, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000180)) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1f) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r4, &(0x7f0000000140)="0833fbd2be6c825fb5662fa6b2bb9ff0007f5ae42a18eee7eea768890d92d5f553d174f74f96baf55ac42bae5ac5ba5211f61eb34c359d404fa0ad48a7ca3ac0e4b9af60a28caab0fc1cac4fadcda97f8646b61313a68545025eaf38d9d1cafb1dac03308442835abeda1f9d723d06486788c1656a47b916e731f560ca31b597e89d18c830f474e05b7bf07b367cfb0bf7eba48016c0bd0ec9c3e7afa7c6631cc610bbb9e29b", 0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x9, &(0x7f0000000540)=ANY=[@ANYBLOB="b40000000000da00d3b106000000000000000000e3ff0000950000007f3f09005e4e73a6ef5f4cd96a28d2540eb450703576235edd88651cc5763754c1f1187f05396ed7fce09065af0200a3339f777d2325348866805c898c6cacd2ac9168d358dc6ba5f614198e633a79c18319a66def805ed7d7fe8380b1017f61a190661a2cb4e71689ea05b3a169c24ec1742c506de1f6c7e1a06814082d6993bd492173dca0836a13896e6aa696760561ae842e220d00d763edccb40b1169d80bad47793fdd308281cd914f50b1a5"], 0x0, 0x5}, 0x48) [ 170.066160] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:53 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 170.796857] FAT-fs (loop0): Unrecognized mount option "codepage=4³7" or missing value 00:24:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:53 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 171.450355] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5a) ioctl$sock_ifreq(r0, 0x89fb, &(0x7f0000000080)={'rose0\x00', @ifru_settings={0x9, 0x0, @sync=&(0x7f0000000040)={0x9, 0x1, 0x2}}}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000180)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VT_RELDISP(r1, 0x5605) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x12000, 0x0) 00:24:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:55 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:55 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x14201, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000002, 0x11, r0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futex(&(0x7f0000000080)=0x2, 0x81, 0x0, &(0x7f0000000100)={r1, r2+30000000}, &(0x7f0000000140), 0x1) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x9, @mcast1, 0xac}, 0x1c) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000001c0)) ioctl$TIOCEXCL(r0, 0x540c) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000200), 0x4) fcntl$setsig(r0, 0xa, 0x29) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000240)="38fe5dfb1f8b1a8caf2707398349a9754c84b869e82200d5a3c9d3", &(0x7f0000000280)=""/8}, 0x18) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000300)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000340)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000380)={0x80, 0x1, 0x4, 0x52d2, 0x3}, 0xc) clock_gettime(0x6, &(0x7f00000003c0)) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000400)={0x7, 0x6}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/enforce\x00', 0x280200, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000480)) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000004c0)) fchmod(r3, 0x1) connect(r0, &(0x7f0000000500)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x0, 0x1, 0x0, 0x1, {0xa, 0x4e21, 0xfffffffffffffffa, @loopback, 0x1}}}, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000580)='dctcp-reno\x00', 0xb) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000700)={'filter\x00', 0x0, 0x3, 0xa9, [], 0x7, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000640)=""/169}, &(0x7f0000000780)=0x78) r4 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x13, r0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000a40)={0x60, 0x0, &(0x7f00000008c0)=[@reply={0x40406301, {0x2, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x48, 0x8, &(0x7f0000000800)=[@fda={0x66646185, 0xa, 0x2, 0x22}, @ptr={0x70742a85, 0x1, &(0x7f00000007c0), 0x1, 0x3, 0x17}], &(0x7f0000000880)=[0x28]}}, @release={0x40046306, 0x2}, @acquire_done={0x40106309, r4, 0x4}], 0xdf, 0x0, &(0x7f0000000940)="020320be3151d4c43584a0031576038487097135dec90aa1627cd5e3a1a75d6528319d54e0f1da17d30a386a695e96a3196d9cbffa8ef2f448c4f3ae455aae127e206e3af6638f6f073e321626e9519eeda57b7e6b46336c01abc58a9ba6e092da72731f4f4020f22f87a3afd6a1634b43500cd0ca589e12f6972462e8be97ba0a01d50438ff3f895c99c0dbc39ed965673bc88e84a603349b9c9b6fefbf2393ec5750669abc4a72e69176c0d3569b1df6b0aa4f601e8fe1c41cfd9c7a29564e4a40974ae6b77781f2f11f4da6c12f5b7e34eff5298dab3489d790763adfd7"}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/checkreqprot\x00', 0x400, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2c, &(0x7f0000000b80)={0x64, {{0xa, 0x4e22, 0x3, @empty, 0x4}}, {{0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x16}, 0x9}}}, 0x108) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000d80)={'broute\x00', 0x0, 0x4, 0xd, [], 0x6, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000d40)=""/13}, &(0x7f0000000e00)=0x78) 00:24:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x401000008912, &(0x7f0000000140)="0adc1f123c12a21d88b061f5e65a72ad6efbbf10da208ab5bb2490189c482b2aa2c671afca55310b4be1257c6565") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c) 00:24:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:55 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) open(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lstat(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fstat(0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) stat(0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000003480)=[{&(0x7f0000000280)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000300)="fb9ea532b220a8015f72209dec0e570bf5ebb46b3681fa0fa857558160a3904d8fb270795bb1780023977a668ac2f0bcbb4a6a86c637034c6d182f7bbe46eb18918c91a1589ae46181dd86da26922f651098bf18e42a00553e1553d79e4397bd122c2fad8f211b05cfec37f404c6e95e75335709b999282f9f9f86ccd27e22e31734354849eb5ec523d9f4b0c08a42dff17bd0ea10bb002f57ae1a650b0a7de3bd081a7b95bb", 0xa6}, {0x0}], 0x2, 0x0, 0x0, 0x40040}, {0x0, 0x0, 0x0}, {&(0x7f0000001c00)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001d80)=[{&(0x7f0000001cc0)="f5df2c1075e9f4c5cc1009d8ad7c37aadacfc00f5a74083751bbf0ffe193a65a399cb6a0698a2eff6e10e203fc2bfbb7fc30818eefc2faee3058e89c7e3cfde38e1cc7587ef420b2021b8258b4cb83a0838a1284c1286296815ec93efb2cbfd081cdd0724e284b29f87c7cef53a8ae77ffd8ba0e40115e646f0ecdb37e7f9fdb3185df", 0x83}], 0x1, 0x0, 0x0, 0x4000}], 0x3, 0x40480d4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0), 0x4) [ 172.545626] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x200000000, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x3, 0x9d4b, 0x7f, 0x81, 0x3c}) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x8, 0x4}}, 0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x80000, 0x0) 00:24:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x400a0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000019007f5300fe01b2a4a280930a600000ffa843359154bda02c0001002caa976b00d1000019000500fe800000000000d21338d54400136ef75afb83de448daa7227c440b8220000060cec4fab91d4000000", 0x55}], 0x1}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) dup3(0xffffffffffffffff, r3, 0x0) [ 172.715637] netlink: 13 bytes leftover after parsing attributes in process `syz-executor5'. 00:24:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) 00:24:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x200000000, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x3, 0x9d4b, 0x7f, 0x81, 0x3c}) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x8, 0x4}}, 0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x80000, 0x0) 00:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x200000000, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x3, 0x9d4b, 0x7f, 0x81, 0x3c}) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x8, 0x4}}, 0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x80000, 0x0) [ 173.247472] netlink: 13 bytes leftover after parsing attributes in process `syz-executor5'. 00:24:56 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:56 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x46400) write$nbd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="6744b58cce6a98000000000000fefff2ff0000"], 0x10) 00:24:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) fcntl$setflags(r1, 0x2, 0x1) pipe(&(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x0, r2+30000000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:24:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x100000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x200000000, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x3, 0x9d4b, 0x7f, 0x81, 0x3c}) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x8, 0x4}}, 0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x80000, 0x0) 00:24:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 173.915126] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:57 executing program 0: mknod$loop(&(0x7f0000000080)='./file1\x00', 0x6003, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getflags(r0, 0x40a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0xa0002005}) r2 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r2) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x2) 00:24:57 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) linkat(0xffffffffffffffff, 0x0, r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:24:57 executing program 0: r0 = open$dir(&(0x7f0000000240)='./file1/file0\x00', 0x200000000010004, 0x1) mknod$loop(&(0x7f0000000280)='./file1\x00', 0x1, 0xffffffffffffffff) linkat(r0, &(0x7f0000000000)='./file2\x00', r0, &(0x7f0000000040)='./file1\x00', 0x1000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000100)=""/221) 00:24:57 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x12d) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x442, 0x0) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f00000000c0)=0x3ff, 0x4) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000040)={0x2, 0x200, 0x1, 0x2, 0x6, 0x9}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$int_out(r2, 0x202000008000451b, 0x0) statx(r1, &(0x7f0000000100)='./file1\x00', 0x1400, 0x201, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000300)=0x68) 00:24:57 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) linkat(0xffffffffffffffff, 0x0, r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:24:57 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x7, 0xc0}, {0x5, 0x6}], r1}, 0x18, 0x3) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x20000000004e20, 0x0, @ipv4}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f00000000c0)=0x8, 0x4) recvmsg(r2, &(0x7f0000000100)={0x0, 0xfffffc66, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2000) 00:24:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="021000000a000000000010ec0000080008001200000402000000004d000007000000b4cb8cb61b12e7280bc1bbb461ae1c6900000000008c0800000000000000006b36ebc6556c898a2e0100ad790000"], 0x50}}, 0xfffffffffffffffd) sendmmsg(r0, &(0x7f0000000180), 0x2ae, 0x0) 00:24:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:57 executing program 3: umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000300)) 00:24:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8906, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1, "b09b6d5c2a91e414699d955ce83b632ad4049739030d61b6f37e405db505735e"}}}}}, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x1f, &(0x7f00000000c0)=0x3f, 0x4) prctl$PR_GET_SECUREBITS(0x1b) 00:24:57 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000080)={@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [{[{0x9100, 0x0, 0x8c, 0x4}], {0x8100, 0x80000001, 0xaab7, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2c, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xec, 0x2, {"4f07b764526b4570e65280fb854163f04da3de2ab3af49cac7505bfb83dbe1403b18e289954bfa0cb5a67630b91a96e25ccbad72f6b36fe0a21a4c374ada0f57677ed7808785a48b23483df5a51bb03c9a989bcc8178591b25385b54f2054e11d1a5506756b305c4678f3f781ea932c6d46d86782ac08af4e56092af28e58025f18d097dc4d86bb933821d481919597ab93b56d42248c6e36ed8a0ec3ad6e8b2846dd450954a93e01876c2e8b9130a4831fb2243de2fb0d87749d68515e59d9fffc1d2c3ff8086ff93e820db2645c8d9b5054a"}}, {0x0, "34c9dae7ba73db4c415fdb14c9dc17521ccd7a87e9b8ab9dcaeb42820be7629c0a461f4ca47321edbecac55306732588a48d8857d50d74b041c6ae42fc9f29dede6ebf0d0c1953c45c0401b89d65f30615b07bba8ac302623ff4ab069c38985c2da59e1548a60d39bcb6be30a46b5e00530ff0911db9a8d6ff874f67abe45141f26b9120148e77c4cfef953de829d341f63e119357d883d4aaa8d4c22ea6755af7711b944e6852d20a0ec55d7450514eea5dc6b9d491dd7621b4e9e4cf3989f9d6070b378355b35e96fdabc5c8be8a67"}}, &(0x7f00000002c0)=""/172, 0x1be, 0xac, 0x1}, 0x20) ioctl$void(r0, 0x5450) 00:24:58 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) socketpair$unix(0x1, 0x80006, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40000, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000140)=""/34) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000200)="488ab16cd36f5ce30d14c22ff10e0c6b19fce8619dcc582dd2e20889ac8ba6bcf2573dd5738483d4ccbb0a655f60e4cd6165f896f50751cf04a356dd8ba3df9f64ac4d2b4972f965b544cf8cdd25c6f910524937fbc8dd9178656f6698793864be3bcedc734541b1302d9e4b275206f944f84ff5c8822347d470725c63b35058337198d9ec903350dd5d981c0dc6002c4f43a4aa7f7733b7b37a281908cb1f896777cf91dcbbd74a562dc134f74a0648", 0xb0, 0x4}], 0x8000, &(0x7f0000000380)={[{@fat=@showexec='showexec'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@smackfsdef={'smackfsdef', 0x3d, '/selinux/checkreqprot\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/checkreqprot\x00'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x7f}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fowner_gt={'fowner>', r3}}]}) [ 174.967019] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 174.980102] sit: non-ECT from 0.0.0.0 with TOS=0x2 00:24:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x80000) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) epoll_create1(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r5 = add_key$user(&(0x7f0000000600)='user\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f00000006c0)="0a9945dd4a9030f4c850cbe58ec496c773990159c7957a4193cb9b6af2b3113429b5eb7186503cb39f9edff01ed29f04b0f0490a987d7bca4fbc5de550e46b2413e11478607841b2f5341b7d3d3952a1604fed2dcc60b1f2c8bd82026da3b1be1633616ea5644e16aeee08e6", 0x6c, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000580)=[{&(0x7f0000000100)="cc8daab54521e7fe7219aeb100746d46e668c860758ccc64b55460279747e457c192a1adbc0daeadea0c64f345b97c408dc9446477b4615549c2e4dcb51574b32e4d7d426dfc84f46a55df3862f793dbd3d6571e0f37bc866352e3a11013b927bf3d381c13dd828bc1", 0x69}, {&(0x7f0000000180)="525c5eb6eae4eca4b73cc1550427c10a7f226d69ec6b900be64605becb00e1060cdbb786791c68bc50c10e9e612b547478face0ed3984361953f03c1d37fe4195a366482e00d2856ee25b0ce26c351868d9f87e25672b807cb3ec1712fda981c4b570765023f99f8cfc40788b88344a43f6952c7b8ace0a86586916582a6c1ab30e6cc283791da5e4c1e802421b9b906310abab137fae48c1410cf1c0f4608025cb4338808cc4e7d7844a16efd0601ce8d26b935209b6e122945c1963e9c0ed302e4884332d65c7ec40f2a7b2872f61d9fe284678210d42bc613bea774966758fea3d33e798153f168f6a1127dc2", 0xee}, {&(0x7f0000000280)="1339598a15d3f648ed152b46715efdf4d56fbd2978da9e101af333067b9024f1b59c5361f080253d146a67f419706818b8de23281d10fb6ae79a14ae5c1d9aaee3da3fd5e0c74c0d91b479308140e2eb3cc9bea410816d34d63542d267d6bc9c2ee00d56a23ccecc481d21e9ba12bad960a996a7b4e609581a291f38e9af29f9c178bb4fe60ed382c99a0f93ef0799579d0050737e759f33cc3dec113fab050a64b608aa3d18a95b1580dbe6", 0xac}, {&(0x7f0000000340)="e3e29958fcb74df88dfb4bc45499e1372341908094f71d4eac9544f13084fc5107fb64adda722cd25cc8e4f97e49e0bac9426995b0bcd2e4b4", 0x39}, {&(0x7f0000000380)="bd6cbb47c546d14d50ede006cc314a8d65a06c05a5e90ca0cc233698134ff4132b2b732b611a591fc1527648831551ca7fa698f644d92c3150cb2597acbec7de406a6fd5de6df5291ca655f7da9e69b429d8f6257d8d6c0c70a55f7df8efdc056a8d94809242bfad162dffd784ca1817cb142350f5a56489fcdc2d954ab761f74834562918fbe4cbf24347f30b8d9e2249abc591dc46c9960138bfcd505dd8f41f19f0bb05b148f2d8b7a25e959067fb3be7637f9426acd3e9b6df0ade368d116bf559053b6fe69616d394", 0xcb}, {&(0x7f0000000480)="e3a69f38ef5cd96bc5efca", 0xb}, {&(0x7f00000004c0)}, {&(0x7f0000000500)="7b9eecb52d8f2aa792bf2eefec13b41dfc7574283cbb59c31d5abb1b9158ee2d669f40f411a0966ba0278b1a1e03347972857672ed517ff80847347af5169b4e59d36da2c8bad872146c1aa0aeddb5bdf1192df900511b4f7abb3065a08e45ab90678d7a9adacd1c5f08ac49ea", 0x6d}], 0x8, r5) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000004c0)) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) dup3(r0, r1, 0x0) 00:24:58 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fcntl$getflags(r0, 0x7) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100), 0x0, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{0x8, 0x2}, {0x8, 0x0, r3}, {0x8, 0x0, r3}], {0x10, 0x2}}, 0x3c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000240)={0x6}, &(0x7f0000000400), &(0x7f00000004c0)={0x77359400}, 0x8) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffcbc) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000003c0)) [ 175.125262] audit: type=1400 audit(1549499098.070:46): avc: denied { getattr } for pid=6247 comm="syz-executor0" path="socket:[17137]" dev="sockfs" ino=17137 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:24:58 executing program 0: r0 = memfd_create(&(0x7f0000000000)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\x9e\xe0\xf3\f\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x95', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) fallocate(r0, 0x0, 0x0, 0x9) r1 = dup3(r0, r0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) lseek(r0, 0x0, 0x4) [ 175.202532] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:58 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) [ 175.382796] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:58 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fcntl$getflags(r0, 0x7) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100), 0x0, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{0x8, 0x2}, {0x8, 0x0, r3}, {0x8, 0x0, r3}], {0x10, 0x2}}, 0x3c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000240)={0x6}, &(0x7f0000000400), &(0x7f00000004c0)={0x77359400}, 0x8) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffcbc) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000003c0)) 00:24:58 executing program 0: r0 = accept(0xffffffffffffff9c, &(0x7f0000000400)=@caif, &(0x7f0000000140)=0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000240)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r1, 0x1, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8, 0x8eb, 0x8000}}}, [""]}, 0x9a}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)=@deltaction={0xb4, 0x31, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0xf3d2}}]}, @TCA_ACT_TAB={0x74, 0x1, [{0x10, 0x17, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x18, 0x5, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x100000001}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4040}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x3f, 0x9, 0x9, 0x0, 0x1}, 0x2c) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x40, r2, 0x304, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x8b}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4000084) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x40003, 0x400000000000, 0x77fffb, 0x0, 0x820005, 0x0}, 0xfffffffffffffff3) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2124000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r1, 0x30, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x10001, 0x0, 0x40, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008800}, 0x40) 00:24:58 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:58 executing program 3: umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000300)) 00:24:58 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fcntl$getflags(r0, 0x7) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100), 0x0, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{0x8, 0x2}, {0x8, 0x0, r3}, {0x8, 0x0, r3}], {0x10, 0x2}}, 0x3c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000240)={0x6}, &(0x7f0000000400), &(0x7f00000004c0)={0x77359400}, 0x8) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffcbc) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000003c0)) 00:24:58 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fcntl$getflags(r0, 0x7) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100), 0x0, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{0x8, 0x2}, {0x8, 0x0, r3}, {0x8, 0x0, r3}], {0x10, 0x2}}, 0x3c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000240)={0x6}, &(0x7f0000000400), &(0x7f00000004c0)={0x77359400}, 0x8) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffcbc) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000003c0)) [ 175.860991] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:58 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') setsockopt$inet6_buf(r0, 0x29, 0x23, 0x0, 0x31d) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r0, 0x4, 0x42803) 00:24:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010003081000418e00000004fcff", 0x58}], 0x1) [ 176.054242] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004640)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000d80)=""/181, 0xb5}, {&(0x7f0000000e40)=""/182, 0xb6}], 0x2}}], 0x1, 0x12000, &(0x7f0000004700)={0x0, 0x989680}) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='mountstats\x00') r1 = add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="dcb03861007a78ee4808da267bb09b74404f637a2ddc0e2490a1e30defbbb08d251a9d5b5976e2d96762d3a00bac28184a726e2d5007018e419228ce8c2595b81d51d7c4155088008a27670550cd2c6feffbe082dc346f61", 0x58, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='mountstats\x00', r1) preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 00:24:59 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:59 executing program 5: perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) 00:24:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @local}}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) [ 176.251264] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:24:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @local}}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 00:24:59 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 00:24:59 executing program 3: umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000300)) 00:24:59 executing program 2: umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:24:59 executing program 0: umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000300)) 00:24:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 176.652121] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:24:59 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="b4fa8288b9cac84cd676ec3b55eb41f9277856aef5e177c47f8003e0b7ff364ab3bcf48cfe680a23c19c5b9b421dbe88b58d5fb7629d4478c38cf7c1602b0d5d72d2765a66e2bbe2a6994a5fc73bbacd41b442ce217af70cc8124cd6b61157c975a645a63d216e12a3570f26b4e623be0611acb2e1015fda863007e19370938baa80c92952e2d849dda7fb291d8ab4d44532778e37ba0a062a70b37f14489bd535510e442857d752ad461a25b5bdfc4a93309f3a8c48733bdb53c64a049daf72d46aa2c1ce01a004b4b9685185d182f31311dbcdfaed01fd2b2cf833100804a35f2cf01e0c25e38dec929fb6e8a848a7b0eb1cb854fec4d4", 0xf8, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="71756965742c646f74732c6e6f646f74732c636f6465706167653d34b3372c66736e6e6d653d6370757365742e6566666563746976655f6d656d73002c736d61636b66737472616e736d7574653d2c0019676d4a079ceff1c4b09380b581c1a15564cf1d31950787bb255d047b1f6d3b10094fa2b60e43067e12133b9f51f14f6641676af902613d1b96f70f0a9920b144d3f0e847079ee36831878ba53547ea773391e421cd10c25a05154568b81ee9edacc8cf9226324abb54a452e6b140db9e62abccc7d81cf4280b6b69e1573d818cfc09911dbccf86ec9278bff48d84b8098b1a2cf151e5010100fe8d6eabaa079e1ac85bd8d1ae22f55cf6caa3d4d3"]) 00:25:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000300)) [ 176.979842] FAT-fs (loop1): Unrecognized mount option "codepage=4³7" or missing value 00:25:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00') sendfile(r1, r2, 0x0, 0x100000001) 00:25:00 executing program 2: umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:25:00 executing program 0: umount2(0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) get_thread_area(&(0x7f0000000100)={0x100, 0x20000800, 0x4000, 0x40, 0x7fffffff, 0x3, 0x9, 0xd4c, 0xfffffffffffffffe, 0x6}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000300)) 00:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e20, 0x2, 'rr\x00', 0x8, 0x7ff, 0x77}, 0x2c) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='rr\x00', 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 00:25:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00') sendfile(r1, r2, 0x0, 0x100000001) [ 177.625258] ================================================================== [ 177.632750] BUG: KASAN: use-after-free in ip_local_deliver+0x43d/0x450 [ 177.639412] Read of size 8 at addr ffff8881d254b3d0 by task syz-executor5/6413 [ 177.646771] [ 177.648402] CPU: 1 PID: 6413 Comm: syz-executor5 Not tainted 4.14.97+ #4 [ 177.655234] Call Trace: [ 177.657807] [ 177.659961] dump_stack+0xb9/0x10e [ 177.663506] ? ip_local_deliver+0x43d/0x450 [ 177.667835] print_address_description+0x60/0x226 [ 177.672682] ? ip_local_deliver+0x43d/0x450 [ 177.677003] kasan_report.cold+0x88/0x2a5 [ 177.681160] ? ip_local_deliver+0x43d/0x450 [ 177.685480] ? ip_call_ra_chain+0x540/0x540 [ 177.689808] ? ip_options_compile+0x65b/0x1360 [ 177.694395] ? ip_rcv+0x9d9/0xf41 [ 177.697854] ? ip_rcv_finish+0x5c9/0x1490 [ 177.701997] ? ip_rcv+0xa1c/0xf41 [ 177.705448] ? ip_local_deliver+0x450/0x450 [ 177.709772] ? ip_local_deliver_finish+0xa20/0xa20 [ 177.715169] ? check_preemption_disabled+0x35/0x1f0 [ 177.720169] ? ip_local_deliver+0x450/0x450 [ 177.724485] ? __netif_receive_skb_core+0x1364/0x2c60 [ 177.729656] ? trace_hardirqs_on+0x10/0x10 [ 177.733872] ? flush_backlog+0x580/0x580 [ 177.737909] ? lock_downgrade+0x5d0/0x5d0 [ 177.742047] ? lock_acquire+0x10f/0x380 [ 177.746004] ? __netif_receive_skb+0x55/0x1f0 [ 177.750474] ? __netif_receive_skb+0x55/0x1f0 [ 177.754949] ? process_backlog+0x1dc/0x640 [ 177.759177] ? net_rx_action+0x213/0xcd0 [ 177.763244] ? net_rx_action+0x36b/0xcd0 [ 177.767291] ? napi_complete_done+0x3a0/0x3a0 [ 177.771765] ? default_inquire_remote_apic+0x50/0x50 [ 177.776846] ? lapic_next_event+0x59/0x90 [ 177.780987] ? __do_softirq+0x234/0x9ca [ 177.784948] ? do_softirq_own_stack+0x2a/0x40 [ 177.789419] [ 177.791633] ? ip_finish_output2+0xa13/0x12f0 [ 177.796107] ? do_softirq.part.0+0x5b/0x60 [ 177.800319] ? __local_bh_enable_ip+0xb0/0xc0 [ 177.804801] ? ip_finish_output2+0xa46/0x12f0 [ 177.809277] ? ip_copy_addrs+0xd0/0xd0 [ 177.813142] ? ip_output+0x397/0x520 [ 177.816832] ? iptable_nat_ipv4_fn+0x30/0x30 [ 177.821221] ? ip_finish_output+0x3ad/0xc70 [ 177.825528] ? ip_finish_output+0x3ad/0xc70 [ 177.829832] ? ip_output+0x1cf/0x520 [ 177.833534] ? ip_mc_output+0xbe0/0xbe0 [ 177.837492] ? ip_fragment.constprop.0+0x200/0x200 [ 177.842399] ? iptable_security_hook+0x174/0x1e0 [ 177.847132] ? check_preemption_disabled+0x35/0x1f0 [ 177.852130] ? raw_sendmsg+0x1be0/0x2270 [ 177.856191] ? raw_seq_next+0x80/0x80 [ 177.859983] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 177.864634] ? lock_acquire+0x10f/0x380 [ 177.868590] ? finish_task_switch+0x1b7/0x620 [ 177.873065] ? ip4_datagram_release_cb+0x990/0x990 [ 177.877997] ? sock_has_perm+0x1d3/0x260 [ 177.882039] ? selinux_tun_dev_create+0xb0/0xb0 [ 177.886691] ? __lock_acquire+0x56a/0x3fa0 [ 177.890909] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 177.895657] ? inet_sendmsg+0x14a/0x510 [ 177.899610] ? inet_recvmsg+0x540/0x540 [ 177.903563] ? sock_sendmsg+0xb7/0x100 [ 177.907429] ? sock_no_sendpage+0x132/0x1a0 [ 177.911727] ? sock_rfree+0x140/0x140 [ 177.915510] ? current_time+0x16/0xb0 [ 177.919308] ? timespec_trunc+0xc9/0x140 [ 177.923356] ? current_time+0x16/0xb0 [ 177.927140] ? inet_sendpage+0x1bb/0x5c0 [ 177.931180] ? inet_getname+0x390/0x390 [ 177.935132] ? kernel_sendpage+0x84/0xd0 [ 177.939170] ? sock_sendpage+0x84/0xa0 [ 177.943042] ? pipe_to_sendpage+0x23d/0x300 [ 177.947341] ? kernel_sendpage+0xd0/0xd0 [ 177.951381] ? direct_splice_actor+0x160/0x160 [ 177.955961] ? splice_from_pipe_next.part.0+0x1e4/0x290 [ 177.961333] ? __splice_from_pipe+0x331/0x740 [ 177.965810] ? direct_splice_actor+0x160/0x160 [ 177.970369] ? direct_splice_actor+0x160/0x160 [ 177.974928] ? splice_from_pipe+0xd9/0x140 [ 177.979162] ? splice_shrink_spd+0xb0/0xb0 [ 177.983390] ? security_file_permission+0x88/0x1e0 [ 177.988309] ? splice_from_pipe+0x140/0x140 [ 177.992609] ? direct_splice_actor+0x118/0x160 [ 177.997184] ? splice_direct_to_actor+0x292/0x760 [ 178.002008] ? generic_pipe_buf_nosteal+0x10/0x10 [ 178.006834] ? do_splice_to+0x150/0x150 [ 178.010787] ? security_file_permission+0x88/0x1e0 [ 178.015708] ? do_splice_direct+0x177/0x240 [ 178.020029] ? splice_direct_to_actor+0x760/0x760 [ 178.024863] ? security_file_permission+0x88/0x1e0 [ 178.029779] ? do_sendfile+0x493/0xb20 [ 178.033649] ? do_compat_pwritev64+0x170/0x170 [ 178.038210] ? put_timespec64+0xbe/0x110 [ 178.042246] ? nsecs_to_jiffies+0x30/0x30 [ 178.046385] ? SyS_sendfile64+0x11f/0x140 [ 178.050509] ? SyS_sendfile+0x150/0x150 [ 178.054469] ? do_clock_gettime+0xd0/0xd0 [ 178.058612] ? do_syscall_64+0x43/0x4b0 [ 178.062570] ? SyS_sendfile+0x150/0x150 [ 178.066538] ? do_syscall_64+0x19b/0x4b0 [ 178.070589] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 178.075946] [ 178.077563] Allocated by task 6413: [ 178.081167] kasan_kmalloc.part.0+0x4f/0xd0 [ 178.085468] kmem_cache_alloc+0xd2/0x2d0 [ 178.089503] __alloc_skb+0xd7/0x550 [ 178.093110] alloc_skb_with_frags+0x85/0x500 [ 178.097497] sock_alloc_send_pskb+0x5a5/0x6f0 [ 178.101967] raw_sendmsg+0x1016/0x2270 [ 178.105834] inet_sendmsg+0x14a/0x510 [ 178.109630] sock_sendmsg+0xb7/0x100 [ 178.113318] sock_no_sendpage+0x132/0x1a0 [ 178.117459] inet_sendpage+0x1bb/0x5c0 [ 178.121332] kernel_sendpage+0x84/0xd0 [ 178.125195] sock_sendpage+0x84/0xa0 [ 178.128885] pipe_to_sendpage+0x23d/0x300 [ 178.133006] __splice_from_pipe+0x331/0x740 [ 178.137302] splice_from_pipe+0xd9/0x140 [ 178.141352] direct_splice_actor+0x118/0x160 [ 178.145736] splice_direct_to_actor+0x292/0x760 [ 178.150382] do_splice_direct+0x177/0x240 [ 178.154505] do_sendfile+0x493/0xb20 [ 178.158204] SyS_sendfile64+0x11f/0x140 [ 178.162154] do_syscall_64+0x19b/0x4b0 [ 178.166013] [ 178.167637] Freed by task 6413: [ 178.170892] kasan_slab_free+0xb0/0x190 [ 178.174841] kmem_cache_free+0xc4/0x330 [ 178.178789] kfree_skbmem+0xa0/0x100 [ 178.182478] kfree_skb+0xcd/0x350 [ 178.185910] ip_defrag+0x5f4/0x3b50 [ 178.189544] ip_local_deliver+0x165/0x450 [ 178.193680] ip_rcv_finish+0x5c9/0x1490 [ 178.197628] ip_rcv+0xa1c/0xf41 [ 178.200886] __netif_receive_skb_core+0x1364/0x2c60 [ 178.205877] __netif_receive_skb+0x55/0x1f0 [ 178.210175] process_backlog+0x1dc/0x640 [ 178.214213] net_rx_action+0x36b/0xcd0 [ 178.218104] [ 178.219707] The buggy address belongs to the object at ffff8881d254b3c0 [ 178.219707] which belongs to the cache skbuff_head_cache of size 224 [ 178.232902] The buggy address is located 16 bytes inside of [ 178.232902] 224-byte region [ffff8881d254b3c0, ffff8881d254b4a0) [ 178.244663] The buggy address belongs to the page: [ 178.249567] page:ffffea00074952c0 count:1 mapcount:0 mapping: (null) index:0x0 [ 178.257703] flags: 0x4000000000000100(slab) [ 178.262013] raw: 4000000000000100 0000000000000000 0000000000000000 00000001800c000c [ 178.269885] raw: dead000000000100 dead000000000200 ffff8881d6758200 0000000000000000 [ 178.277737] page dumped because: kasan: bad access detected [ 178.283416] [ 178.285018] Memory state around the buggy address: [ 178.289935] ffff8881d254b280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 178.297272] ffff8881d254b300: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 178.304607] >ffff8881d254b380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 178.311940] ^ [ 178.317884] ffff8881d254b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 178.325229] ffff8881d254b480: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 178.332590] ================================================================== [ 178.339941] Disabling lock debugging due to kernel taint [ 178.346496] Kernel panic - not syncing: panic_on_warn set ... [ 178.346496] [ 178.353876] CPU: 1 PID: 6413 Comm: syz-executor5 Tainted: G B 4.14.97+ #4 [ 178.361921] Call Trace: [ 178.364494] [ 178.366655] dump_stack+0xb9/0x10e [ 178.370192] panic+0x1d9/0x3c2 [ 178.373379] ? add_taint.cold+0x16/0x16 [ 178.377357] ? ip_local_deliver+0x43d/0x450 [ 178.381674] kasan_end_report+0x43/0x49 [ 178.385641] kasan_report.cold+0xa4/0x2a5 [ 178.389785] ? ip_local_deliver+0x43d/0x450 [ 178.394098] ? ip_call_ra_chain+0x540/0x540 [ 178.398412] ? ip_options_compile+0x65b/0x1360 [ 178.402987] ? ip_rcv+0x9d9/0xf41 [ 178.406435] ? ip_rcv_finish+0x5c9/0x1490 [ 178.410584] ? ip_rcv+0xa1c/0xf41 [ 178.414038] ? ip_local_deliver+0x450/0x450 [ 178.418354] ? ip_local_deliver_finish+0xa20/0xa20 [ 178.423286] ? check_preemption_disabled+0x35/0x1f0 [ 178.428299] ? ip_local_deliver+0x450/0x450 [ 178.432617] ? __netif_receive_skb_core+0x1364/0x2c60 [ 178.437799] ? trace_hardirqs_on+0x10/0x10 [ 178.442026] ? flush_backlog+0x580/0x580 [ 178.446091] ? lock_downgrade+0x5d0/0x5d0 [ 178.450241] ? lock_acquire+0x10f/0x380 [ 178.454213] ? __netif_receive_skb+0x55/0x1f0 [ 178.458704] ? __netif_receive_skb+0x55/0x1f0 [ 178.463192] ? process_backlog+0x1dc/0x640 [ 178.467596] ? net_rx_action+0x213/0xcd0 [ 178.471652] ? net_rx_action+0x36b/0xcd0 [ 178.475701] ? napi_complete_done+0x3a0/0x3a0 [ 178.480186] ? default_inquire_remote_apic+0x50/0x50 [ 178.485271] ? lapic_next_event+0x59/0x90 [ 178.489412] ? __do_softirq+0x234/0x9ca [ 178.493374] ? do_softirq_own_stack+0x2a/0x40 [ 178.497848] [ 178.500073] ? ip_finish_output2+0xa13/0x12f0 [ 178.504555] ? do_softirq.part.0+0x5b/0x60 [ 178.508776] ? __local_bh_enable_ip+0xb0/0xc0 [ 178.513255] ? ip_finish_output2+0xa46/0x12f0 [ 178.517737] ? ip_copy_addrs+0xd0/0xd0 [ 178.521610] ? ip_output+0x397/0x520 [ 178.525310] ? iptable_nat_ipv4_fn+0x30/0x30 [ 178.529702] ? ip_finish_output+0x3ad/0xc70 [ 178.534006] ? ip_finish_output+0x3ad/0xc70 [ 178.538317] ? ip_output+0x1cf/0x520 [ 178.542015] ? ip_mc_output+0xbe0/0xbe0 [ 178.546026] ? ip_fragment.constprop.0+0x200/0x200 [ 178.550948] ? iptable_security_hook+0x174/0x1e0 [ 178.555687] ? check_preemption_disabled+0x35/0x1f0 [ 178.560692] ? raw_sendmsg+0x1be0/0x2270 [ 178.564741] ? raw_seq_next+0x80/0x80 [ 178.568531] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 178.573189] ? lock_acquire+0x10f/0x380 [ 178.577247] ? finish_task_switch+0x1b7/0x620 [ 178.581727] ? ip4_datagram_release_cb+0x990/0x990 [ 178.586667] ? sock_has_perm+0x1d3/0x260 [ 178.590716] ? selinux_tun_dev_create+0xb0/0xb0 [ 178.595377] ? __lock_acquire+0x56a/0x3fa0 [ 178.599594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 178.604337] ? inet_sendmsg+0x14a/0x510 [ 178.608296] ? inet_recvmsg+0x540/0x540 [ 178.612270] ? sock_sendmsg+0xb7/0x100 [ 178.616142] ? sock_no_sendpage+0x132/0x1a0 [ 178.620445] ? sock_rfree+0x140/0x140 [ 178.624228] ? current_time+0x16/0xb0 [ 178.628016] ? timespec_trunc+0xc9/0x140 [ 178.632086] ? current_time+0x16/0xb0 [ 178.635875] ? inet_sendpage+0x1bb/0x5c0 [ 178.639922] ? inet_getname+0x390/0x390 [ 178.643877] ? kernel_sendpage+0x84/0xd0 [ 178.647937] ? sock_sendpage+0x84/0xa0 [ 178.651839] ? pipe_to_sendpage+0x23d/0x300 [ 178.656149] ? kernel_sendpage+0xd0/0xd0 [ 178.660198] ? direct_splice_actor+0x160/0x160 [ 178.664763] ? splice_from_pipe_next.part.0+0x1e4/0x290 [ 178.670115] ? __splice_from_pipe+0x331/0x740 [ 178.674597] ? direct_splice_actor+0x160/0x160 [ 178.679164] ? direct_splice_actor+0x160/0x160 [ 178.683728] ? splice_from_pipe+0xd9/0x140 [ 178.687948] ? splice_shrink_spd+0xb0/0xb0 [ 178.692171] ? security_file_permission+0x88/0x1e0 [ 178.697088] ? splice_from_pipe+0x140/0x140 [ 178.701394] ? direct_splice_actor+0x118/0x160 [ 178.705960] ? splice_direct_to_actor+0x292/0x760 [ 178.710786] ? generic_pipe_buf_nosteal+0x10/0x10 [ 178.715612] ? do_splice_to+0x150/0x150 [ 178.719574] ? security_file_permission+0x88/0x1e0 [ 178.724490] ? do_splice_direct+0x177/0x240 [ 178.728797] ? splice_direct_to_actor+0x760/0x760 [ 178.733627] ? security_file_permission+0x88/0x1e0 [ 178.738551] ? do_sendfile+0x493/0xb20 [ 178.742427] ? do_compat_pwritev64+0x170/0x170 [ 178.746995] ? put_timespec64+0xbe/0x110 [ 178.751043] ? nsecs_to_jiffies+0x30/0x30 [ 178.755179] ? SyS_sendfile64+0x11f/0x140 [ 178.759309] ? SyS_sendfile+0x150/0x150 [ 178.763265] ? do_clock_gettime+0xd0/0xd0 [ 178.767397] ? do_syscall_64+0x43/0x4b0 [ 178.771356] ? SyS_sendfile+0x150/0x150 [ 178.775319] ? do_syscall_64+0x19b/0x4b0 [ 178.779369] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 178.785041] Kernel Offset: 0x2e400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 178.795942] Rebooting in 86400 seconds..