Warning: Permanently added '10.128.0.50' (ECDSA) to the list of known hosts. 2020/02/18 20:02:02 fuzzer started syzkaller login: [ 101.972564][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 101.972581][ T27] audit: type=1400 audit(1582056122.211:42): avc: denied { map } for pid=10588 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/18 20:02:04 dialing manager at 10.128.0.26:36893 2020/02/18 20:02:04 syscalls: 2973 2020/02/18 20:02:04 code coverage: enabled 2020/02/18 20:02:04 comparison tracing: enabled 2020/02/18 20:02:04 extra coverage: enabled 2020/02/18 20:02:04 setuid sandbox: enabled 2020/02/18 20:02:04 namespace sandbox: enabled 2020/02/18 20:02:04 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/18 20:02:04 fault injection: enabled 2020/02/18 20:02:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/18 20:02:04 net packet injection: enabled 2020/02/18 20:02:04 net device setup: enabled 2020/02/18 20:02:04 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/18 20:02:04 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 104.170407][ T27] audit: type=1400 audit(1582056124.401:43): avc: denied { integrity } for pid=10603 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 20:05:08 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000240)=0x79, 0xfe37) writev(r1, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r1, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) [ 288.765407][ T27] audit: type=1400 audit(1582056309.001:44): avc: denied { map } for pid=10605 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=22703 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 20:05:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x5a) [ 288.982789][T10606] IPVS: ftp: loaded support on port[0] = 21 [ 289.163758][T10608] IPVS: ftp: loaded support on port[0] = 21 [ 289.230349][T10606] chnl_net:caif_netlink_parms(): no params data found 20:05:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x0, 0x10}, 0xc) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 289.465046][T10608] chnl_net:caif_netlink_parms(): no params data found [ 289.478380][T10606] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.486431][T10606] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.497930][T10606] device bridge_slave_0 entered promiscuous mode [ 289.529801][T10606] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.538845][T10606] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.550015][T10606] device bridge_slave_1 entered promiscuous mode [ 289.614156][T10615] IPVS: ftp: loaded support on port[0] = 21 [ 289.638383][T10606] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.654862][T10606] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 20:05:09 executing program 3: sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)="057f53302a63bbddc670000002", 0xd, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000040), 0xc) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000000)={'wg0\x00'}) [ 289.676636][T10608] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.686284][T10608] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.694776][T10608] device bridge_slave_0 entered promiscuous mode [ 289.725033][T10606] team0: Port device team_slave_0 added [ 289.755778][T10608] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.772254][T10608] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.780832][T10608] device bridge_slave_1 entered promiscuous mode [ 289.790230][T10606] team0: Port device team_slave_1 added [ 289.828385][T10608] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.848983][T10606] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 289.856660][T10606] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.883609][T10606] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 289.898900][T10606] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 289.907488][T10606] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.934941][T10606] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 289.949216][T10608] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 20:05:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x4) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 290.055376][T10606] device hsr_slave_0 entered promiscuous mode [ 290.104571][T10606] device hsr_slave_1 entered promiscuous mode [ 290.173478][T10608] team0: Port device team_slave_0 added [ 290.193756][T10608] team0: Port device team_slave_1 added [ 290.228402][T10620] IPVS: ftp: loaded support on port[0] = 21 [ 290.321865][T10608] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 290.342373][T10608] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.384384][T10608] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 290.409685][T10608] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 290.416981][T10608] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.446824][T10608] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 20:05:10 executing program 5: socket$phonet(0x23, 0x2, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000880)=@filter={'filter\x00', 0xe, 0x4, 0x360, 0x1c0, 0x0, 0x1c0, 0x1c0, 0x0, 0x290, 0x290, 0x290, 0x290, 0x290, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'macvlan1\x00'}}}, {{@ipv6={@mcast2, @empty, [], [], '\x00', 'team_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000001e80)=0xe8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001ec0)={'sit0\x00', r5}) getdents64(r3, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r3, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) getpid() open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 290.503254][T10615] chnl_net:caif_netlink_parms(): no params data found [ 290.519953][T10623] IPVS: ftp: loaded support on port[0] = 21 [ 290.646181][T10608] device hsr_slave_0 entered promiscuous mode [ 290.702400][T10608] device hsr_slave_1 entered promiscuous mode [ 290.773143][T10608] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 290.780958][T10608] Cannot create hsr debugfs directory [ 290.841150][T10625] IPVS: ftp: loaded support on port[0] = 21 [ 290.921229][T10615] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.929064][T10615] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.939025][T10615] device bridge_slave_0 entered promiscuous mode [ 290.983011][T10615] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.990949][T10615] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.999701][T10615] device bridge_slave_1 entered promiscuous mode [ 291.024403][T10606] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 291.033810][ T27] audit: type=1400 audit(1582056311.251:45): avc: denied { create } for pid=10606 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 291.059656][ T27] audit: type=1400 audit(1582056311.251:46): avc: denied { write } for pid=10606 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 291.085436][ T27] audit: type=1400 audit(1582056311.261:47): avc: denied { read } for pid=10606 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 291.123500][T10620] chnl_net:caif_netlink_parms(): no params data found [ 291.136391][T10606] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 291.186682][T10606] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 291.246741][T10606] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 291.306434][T10615] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.355090][T10615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.496200][T10615] team0: Port device team_slave_0 added [ 291.513984][T10615] team0: Port device team_slave_1 added [ 291.540093][T10620] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.547637][T10620] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.556189][T10620] device bridge_slave_0 entered promiscuous mode [ 291.583713][T10615] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 291.590704][T10615] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.618626][T10615] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 291.635929][T10620] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.644311][T10620] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.652922][T10620] device bridge_slave_1 entered promiscuous mode [ 291.665015][T10623] chnl_net:caif_netlink_parms(): no params data found [ 291.675101][T10625] chnl_net:caif_netlink_parms(): no params data found [ 291.685306][T10615] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 291.694482][T10615] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.720960][T10615] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 291.773436][T10608] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 291.837282][T10620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.852554][T10620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.874658][T10608] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 291.995496][T10615] device hsr_slave_0 entered promiscuous mode [ 292.034120][T10615] device hsr_slave_1 entered promiscuous mode [ 292.082499][T10615] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 292.090313][T10615] Cannot create hsr debugfs directory [ 292.123716][T10608] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 292.250445][T10608] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 292.306932][T10620] team0: Port device team_slave_0 added [ 292.317321][T10620] team0: Port device team_slave_1 added [ 292.384387][T10625] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.391533][T10625] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.401989][T10625] device bridge_slave_0 entered promiscuous mode [ 292.423125][T10623] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.430210][T10623] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.442273][T10623] device bridge_slave_0 entered promiscuous mode [ 292.461423][T10620] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 292.468768][T10620] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 292.495227][T10620] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 292.511567][T10625] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.520337][T10625] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.528784][T10625] device bridge_slave_1 entered promiscuous mode [ 292.542756][T10623] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.549843][T10623] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.558771][T10623] device bridge_slave_1 entered promiscuous mode [ 292.577233][T10620] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 292.584362][T10620] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 292.613690][T10620] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 292.663561][T10625] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.681651][T10623] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.759624][T10620] device hsr_slave_0 entered promiscuous mode [ 292.802633][T10620] device hsr_slave_1 entered promiscuous mode [ 292.852210][T10620] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 292.859851][T10620] Cannot create hsr debugfs directory [ 292.876853][T10625] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 292.896474][T10623] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 292.970694][T10623] team0: Port device team_slave_0 added [ 292.985400][T10625] team0: Port device team_slave_0 added [ 292.996053][T10625] team0: Port device team_slave_1 added [ 293.026145][T10623] team0: Port device team_slave_1 added [ 293.089721][T10625] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 293.097035][T10625] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.123381][T10625] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 293.140183][T10623] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 293.148119][T10623] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.177116][T10623] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 293.192437][T10623] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 293.199412][T10623] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.226082][T10623] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 293.253166][T10625] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 293.260148][T10625] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.287202][T10625] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 293.405477][T10625] device hsr_slave_0 entered promiscuous mode [ 293.452471][T10625] device hsr_slave_1 entered promiscuous mode [ 293.489197][T10625] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 293.496852][T10625] Cannot create hsr debugfs directory [ 293.513111][T10620] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 293.564981][T10620] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 293.624745][T10620] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 293.735457][T10623] device hsr_slave_0 entered promiscuous mode [ 293.782499][T10623] device hsr_slave_1 entered promiscuous mode [ 293.833594][T10623] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 293.841202][T10623] Cannot create hsr debugfs directory [ 293.866541][T10606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.876492][T10620] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 294.000119][T10615] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 294.058996][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.067699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.078212][T10615] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 294.161732][T10606] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.170215][T10615] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 294.229546][T10615] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 294.297431][T10608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.362399][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.371086][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.380897][ T2919] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.388262][ T2919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.397797][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.406983][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.415999][ T2919] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.423289][ T2919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.466006][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.477738][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.500501][T10608] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.509287][T10623] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 294.577964][T10623] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 294.633575][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.641546][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.668944][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.684160][T10623] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 294.739587][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.753378][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.761862][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.773331][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.782483][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.791218][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.800192][ T3140] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.807359][ T3140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.815670][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.823730][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.831966][T10623] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 294.932243][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.941303][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.950757][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.961174][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.971550][ T2918] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.978766][ T2918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.993543][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.002802][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.011427][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.041219][T10606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.102959][T10625] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 295.155328][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.165747][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.174563][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.184129][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.195221][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.205639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.214730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.225859][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.257211][T10615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.264616][T10625] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 295.295644][T10625] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 295.355444][T10625] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 295.420608][T10608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.435281][T10608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.443997][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.455831][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.464364][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.471934][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.498153][T10620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.535249][T10620] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.551064][T10606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.560747][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.574523][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.615791][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.628497][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.645645][T10615] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.685160][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.695927][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.705527][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.712741][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.720636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.729737][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.738461][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.745732][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.754395][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.764772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.774322][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.782841][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.789885][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.798102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.807172][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.816114][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.823198][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.862726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.870809][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.885817][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.894544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.902820][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.911573][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.922684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.931843][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.942528][T10608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.950395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.996943][T10623] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.028438][T10615] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 296.043875][T10615] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 296.059512][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 296.069104][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 296.078558][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.087444][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 296.096257][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.105344][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.114939][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.124398][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 296.133728][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.143186][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.153255][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.161723][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 296.170993][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.180935][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.189848][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.258575][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.267832][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.276726][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.285439][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.294298][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 296.303860][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.312780][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 296.323611][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.337113][T10623] 8021q: adding VLAN 0 to HW filter on device team0 [ 296.355051][T10606] device veth0_vlan entered promiscuous mode [ 296.376248][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.384216][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.412766][T10615] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.429463][T10620] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 296.446054][T10620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.462633][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.470199][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.478254][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.487109][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.495916][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 296.504962][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.514572][ T2921] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.521669][ T2921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.543368][T10606] device veth1_vlan entered promiscuous mode [ 296.564888][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 296.576459][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 296.585078][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 296.597394][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 296.606404][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.618383][ T2921] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.625515][ T2921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.637314][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 296.645988][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.669466][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.683426][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.691216][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 296.703715][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 296.719996][T10608] device veth0_vlan entered promiscuous mode [ 296.769088][T10625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.776582][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 296.789824][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.808791][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 296.819822][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.830277][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 296.840056][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.860209][T10608] device veth1_vlan entered promiscuous mode [ 296.882992][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 296.893809][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.903398][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.914462][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.938994][T10620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.972919][T10606] device veth0_macvtap entered promiscuous mode [ 296.981890][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.996918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.006412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.015469][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.026348][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.035652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.044817][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 297.053884][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.066533][T10625] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.084853][T10623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 297.100822][T10606] device veth1_macvtap entered promiscuous mode [ 297.111836][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 297.124777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.134573][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.146038][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.155523][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.213167][T10615] device veth0_vlan entered promiscuous mode [ 297.227917][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.240684][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.249467][ T2921] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.256603][ T2921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.264654][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 297.273987][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.282956][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.305459][T10608] device veth0_macvtap entered promiscuous mode [ 297.346638][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 297.355569][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.366630][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 297.377744][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 297.385826][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.394924][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.403819][ T2921] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.410872][ T2921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.418723][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 297.459827][T10606] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 297.468288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.479729][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.488527][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.497334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.506625][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.517181][T10608] device veth1_macvtap entered promiscuous mode [ 297.526515][T10615] device veth1_vlan entered promiscuous mode [ 297.539090][T10623] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 297.549422][T10620] device veth0_vlan entered promiscuous mode [ 297.569169][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 297.586359][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 297.596724][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.605264][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.625863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.640740][T10606] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 297.677116][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 297.685706][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.695186][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.704763][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 297.714393][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.723833][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.733604][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.752399][T10608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.763989][T10608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.777141][T10608] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 297.790901][T10620] device veth1_vlan entered promiscuous mode [ 297.814585][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 297.824954][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 297.833557][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.842828][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.866679][T10608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.878820][T10608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.894130][T10608] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 297.913343][T10615] device veth0_macvtap entered promiscuous mode [ 297.922725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 297.931045][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.940488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.949441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.959014][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.968235][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 297.977386][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.987611][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 298.016684][T10615] device veth1_macvtap entered promiscuous mode [ 298.094668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.105493][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.116357][T10625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 298.143552][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 298.157528][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 298.262269][ T27] audit: type=1400 audit(1582056318.491:48): avc: denied { associate } for pid=10606 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 298.380469][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 298.390488][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.415622][T10620] device veth0_macvtap entered promiscuous mode [ 298.464037][ T27] audit: type=1400 audit(1582056318.701:49): avc: denied { open } for pid=10647 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 298.492124][ T27] audit: type=1400 audit(1582056318.721:50): avc: denied { confidentiality } for pid=10647 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 298.529579][T10620] device veth1_macvtap entered promiscuous mode 20:05:18 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') [ 298.563740][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 298.571889][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.587043][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 298.596657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 298.661768][T10623] device veth0_vlan entered promiscuous mode [ 298.679742][ T27] audit: type=1400 audit(1582056318.911:51): avc: denied { map_create } for pid=10652 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 298.707546][T10625] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 298.733682][ T27] audit: type=1400 audit(1582056318.911:52): avc: denied { map_read map_write } for pid=10652 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 298.744437][T10615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.771728][ T27] audit: type=1400 audit(1582056318.911:53): avc: denied { kernel } for pid=10652 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 298.797760][T10615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.808399][T10615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.820692][T10615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.826198][ T27] audit: type=1400 audit(1582056319.061:54): avc: denied { prog_load } for pid=10652 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 298.834709][T10615] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 298.875283][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 298.885460][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.894467][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 298.904011][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.935602][T10623] device veth1_vlan entered promiscuous mode [ 298.966541][T10615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 299.000144][T10615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.030344][T10615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 20:05:19 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23}, 0x80, 0x0}, 0xfd00) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000000c0)="3354c40ae56f2028ffa722d4cad8ba44908cdfa3f40f62ed52e59b2ec9dee489c56edb48c41dbd32e975bec9104841d8ad992149b3020762e808f4695f80c860e165bc0de1f055cdacc08907c8de8aad674891e53b9e19c0e4085eaede585251021126859c4104014b721b737d478d23d935388e702a06dc1823980f69b511f0d2035c8d9cf57b516c16f8dd7a99159245823ecf23201c776a8d72dd4fa7d117a303219b2dc22658313282faa50dec789f648c13eee601a5f479c4d7011ff737621b8a9b822ce70124ec13a6935869c46835618258c6efe075bb1292ce9895faabb6c0d0b2d0135acd8a444cbb443b4550a291faec5546", 0xf7}, {&(0x7f00000001c0)="830bf8fa1f5bda6be1c2dbf6cc1f70d1cdbf7e97e7267016e24a41ba13ef1f066240ce3db382e08373dd84ab6597e7e391caa4710bc6dbbc521e4f80f90d3e2d432749927d888e85f91be6f7f79f86dca0b7c1f9c59ffbe34022bfb2ed132d988c5bc536c90b99c39dba11840f148fb1f8c54216fee00899a8bfb1bd0294aef4d132684adc053611", 0x88}, {&(0x7f0000000400)="4c213f37c73610b29f6f39104f70add92ca9d29323474e4e925f15838382d1cdb6395fe36c08cba529a1d9f65a50d49800debb6ab4bb91680a4876e2774a9ded5cba67b56932e70fdd52c1a4e029e3bd70c84053a0bd40261ee8d0f8ae8074e98dc9c90946befcae49e037f5048a37379b276f083cea", 0x76}], 0x3}, 0xc100) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 299.053409][T10615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.066730][T10615] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 299.081809][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 20:05:19 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$kcm(0xa, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x84) r1 = socket$kcm(0xa, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x10d, 0xb, &(0x7f0000000000)=r2, 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40004) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0xc004743e, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffff58) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r6}) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') [ 299.106008][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.122227][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 299.130638][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.146774][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.317748][T10620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 299.330935][T10620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.349050][T10620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 299.360956][T10620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.371823][T10620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 299.385350][T10620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.398953][T10620] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 299.409724][T10668] device lo entered promiscuous mode [ 299.516955][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 299.532979][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.575904][T10620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 299.587884][T10620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.612100][T10620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 299.632776][T10620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.652135][T10620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 299.672149][T10620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 299.699261][T10620] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 299.731713][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.741053][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:05:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884cb41e77310e11ca44825cc4f142133d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3df}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b91803b700030000009e40f088641fffffe100000021638477fbac14143ae0004301c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) [ 299.905569][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 299.926986][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.072931][ T27] audit: type=1400 audit(1582056320.311:55): avc: denied { prog_run } for pid=10698 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:05:20 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$kcm(0xa, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x84) r1 = socket$kcm(0xa, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x10d, 0xb, &(0x7f0000000000)=r2, 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40004) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0xc004743e, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffff58) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r6}) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') [ 300.152451][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 300.161191][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.263724][T10623] device veth0_macvtap entered promiscuous mode [ 300.297037][ C0] hrtimer: interrupt took 28749 ns [ 300.438762][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 300.460392][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.503764][T10623] device veth1_macvtap entered promiscuous mode 20:05:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5bf}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'\x00', 0x802}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x24041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x29, 0x6, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0xffffffffffffffda) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f0000000300)='gre0\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0x0, 0x0, 0xdea2987c6ce449d8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x4, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 300.620607][T10625] device veth0_vlan entered promiscuous mode [ 300.660791][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.675493][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.754947][T10625] device veth1_vlan entered promiscuous mode [ 300.792758][T10623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 20:05:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 300.824939][T10623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 20:05:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) [ 300.865773][T10623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 300.934443][T10623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.010487][T10623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 301.027022][T10623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.040372][T10623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 301.057895][T10623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.070818][T10623] batman_adv: batadv0: Interface activated: batadv_slave_0 20:05:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 301.344706][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 301.359107][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 301.377408][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 301.398452][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 20:05:21 executing program 3: socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x2010, 0xffffffffffffffff, 0xfffff000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) syz_open_procfs(0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='>'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r2, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r3, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 301.462743][T10623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 301.487465][T10623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.506588][T10623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 301.538497][T10623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.564343][T10623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 301.608591][T10623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.652189][T10623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 301.669225][T10623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.681423][T10623] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 301.713090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 301.724916][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 301.799339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 301.814272][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.835337][T10625] device veth0_macvtap entered promiscuous mode [ 301.917705][T10625] device veth1_macvtap entered promiscuous mode [ 302.078682][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 302.109366][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.129015][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 302.140185][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.151356][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 302.161999][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.172251][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 302.182879][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.193320][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 302.204926][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.216232][T10625] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 302.227364][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 302.236565][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 302.244928][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 302.253958][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 302.267648][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 302.278938][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.289505][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 302.319923][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.329944][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 302.340772][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.351149][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 302.363644][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.373722][T10625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 302.384922][T10625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.396640][T10625] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 302.406405][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 20:05:22 executing program 4: getpgid(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002840)={0x90, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}}}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x80000004, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x8000}}}, 0x90) [ 302.415245][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.786468][T10761] x_tables: duplicate underflow at hook 2 20:05:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='pstore\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='mountinfo\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x3ff) 20:05:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0xb, 0x0, "9cb4aa39e1bd413767b251106a71d3a1dcf3eb07b3ecd4d781f55175b3de575b1269b01fc34e10024d64b0c95e9e86d37d57e8a63c94c9489afca5c76ac77e3e2297c70b0a0e0039fd5af5389f988c9d"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x9}, 0xd8) 20:05:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5bf}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'\x00', 0x802}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x24041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x29, 0x6, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0xffffffffffffffda) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f0000000300)='gre0\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0x0, 0x0, 0xdea2987c6ce449d8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x4, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) 20:05:23 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x2, &(0x7f0000000240)=[{0x15, 0x0, 0x0, 0xffffffff}, {0x6}]}, 0x10) 20:05:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x0, 0x0, 0xe}, @func_proto]}}, &(0x7f0000000040)=""/233, 0x32, 0xe9, 0x8}, 0x20) 20:05:24 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x44011) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000008640)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4) 20:05:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0xb, 0x0, "9cb4aa39e1bd413767b251106a71d3a1dcf3eb07b3ecd4d781f55175b3de575b1269b01fc34e10024d64b0c95e9e86d37d57e8a63c94c9489afca5c76ac77e3e2297c70b0a0e0039fd5af5389f988c9d"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x9}, 0xd8) [ 303.941957][T10786] BPF:[1] VAR (anon) [ 303.947530][T10786] BPF:type_id=0 linkage=0 [ 303.981592][T10786] BPF: [ 304.008114][T10786] BPF:Invalid name [ 304.030916][T10786] BPF: [ 304.030916][T10786] [ 304.105017][T10786] BPF:[1] VAR (anon) 20:05:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 304.149862][T10786] BPF:type_id=0 linkage=0 [ 304.187362][T10786] BPF: [ 304.190289][T10786] BPF:Invalid name [ 304.204641][T10786] BPF: [ 304.204641][T10786] 20:05:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0xb, 0x0, "9cb4aa39e1bd413767b251106a71d3a1dcf3eb07b3ecd4d781f55175b3de575b1269b01fc34e10024d64b0c95e9e86d37d57e8a63c94c9489afca5c76ac77e3e2297c70b0a0e0039fd5af5389f988c9d"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x9}, 0xd8) 20:05:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0xb, 0x0, "9cb4aa39e1bd413767b251106a71d3a1dcf3eb07b3ecd4d781f55175b3de575b1269b01fc34e10024d64b0c95e9e86d37d57e8a63c94c9489afca5c76ac77e3e2297c70b0a0e0039fd5af5389f988c9d"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x9}, 0xd8) 20:05:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:24 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r6, 0x0, 0x44011) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000008640)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="240000002e000102000000000000000700000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000f1ff"], 0x24}}, 0x4) 20:05:24 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x44011) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000008640)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4) 20:05:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x44011) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000008640)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4) 20:05:24 executing program 4: socket$inet6(0xa, 0x80002, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x4e0a02, 0x0) epoll_pwait(r0, &(0x7f0000001080), 0x0, 0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000005, 0x2010, 0xffffffffffffffff, 0xfffff000) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) syz_open_procfs(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, 0x0, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r5, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x10, &(0x7f0000000040)={&(0x7f0000000280)=""/236, 0xec, r5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r2, 0x10, &(0x7f00000000c0)={&(0x7f00000004c0)=""/4096, 0x1000, r6}}, 0x10) 20:05:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:25 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r6, 0x0, 0x44011) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000008640)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="240000002e000102000000000000000700000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000f1ff"], 0x24}}, 0x4) 20:05:25 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x44011) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000008640)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4) 20:05:25 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:25 executing program 4: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @multicast2}, {0x0, @broadcast}, 0x5a, {}, 'vlan1\x00'}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000280)={[], 0x5}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)=0x1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000880)={0x6, 0x0, 0x880ebaeec96b0fae, 0x400}) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) 20:05:25 executing program 3: socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='smaps\x00') fchmod(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc), 0x4) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7a6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x103080, 0x75) symlinkat(&(0x7f00000003c0)='./file0\x00', r3, &(0x7f00000004c0)='./file0/file0\x00') r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000002c0)='./file0/file0\x00', r4, &(0x7f0000000180)='./file0/file0\x00') renameat2(r4, &(0x7f0000000100)='./file0/file0\x00', r4, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+'}, 0x16, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 20:05:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 305.694683][T10846] FAT-fs (loop4): bogus number of reserved sectors [ 305.728325][T10846] FAT-fs (loop4): Can't find a valid FAT filesystem [ 305.752362][T10851] mmap: syz-executor.4 (10851) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 20:05:26 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:26 executing program 0: socket$inet6(0xa, 0x80002, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x4e0a02, 0x0) epoll_pwait(r0, &(0x7f0000001080), 0x0, 0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000005, 0x2010, 0xffffffffffffffff, 0xfffff000) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) syz_open_procfs(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, 0x0, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0}}, 0x10) 20:05:26 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="62020207e0000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = socket(0x18, 0x2, 0x0) dup2(r0, r1) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) r2 = socket(0x2, 0x8002, 0x0) r3 = dup2(r0, r1) dup2(r3, r2) connect$unix(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="25d900000001"], 0x10) r4 = socket(0x2, 0x2, 0x0) bind(r4, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r5 = socket(0x18, 0x2, 0x0) r6 = socket(0x2, 0x8002, 0x0) r7 = dup2(r4, r5) dup2(r7, r6) connect$unix(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="25d900000001"], 0x10) 20:05:26 executing program 1: perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:26 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000002c0)=""/216, 0xd8}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x40002) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) connect(r1, &(0x7f0000000280)=@in={0x10, 0x2}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) nanosleep(&(0x7f0000000000)={0x3}, &(0x7f0000000140)) shutdown(r2, 0x0) 20:05:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000002c0)=""/216, 0xd8}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) connect(r1, &(0x7f0000000280)=@in={0x10, 0x2}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) nanosleep(&(0x7f0000000000)={0x3}, &(0x7f0000000140)) shutdown(r2, 0x0) 20:05:26 executing program 1: perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/64) 20:05:26 executing program 2: bpf$MAP_CREATE(0x900000000000000, 0x0, 0x0) 20:05:26 executing program 1: perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:27 executing program 2: bpf$MAP_CREATE(0x900000000000000, 0x0, 0x0) 20:05:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 20:05:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@empty}, 0x20) 20:05:27 executing program 2: bpf$MAP_CREATE(0x900000000000000, 0x0, 0x0) 20:05:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 306.946752][ T27] audit: type=1400 audit(1582056327.181:56): avc: denied { create } for pid=10907 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 306.972142][ T27] audit: type=1400 audit(1582056327.181:57): avc: denied { write } for pid=10907 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:05:27 executing program 0: 20:05:27 executing program 5: 20:05:27 executing program 3: 20:05:27 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x0, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:27 executing program 4: 20:05:27 executing program 0: 20:05:27 executing program 5: 20:05:27 executing program 0: 20:05:27 executing program 4: 20:05:27 executing program 5: 20:05:27 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x0, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:28 executing program 3: 20:05:28 executing program 4: 20:05:28 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x0, 0x4, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:28 executing program 5: 20:05:28 executing program 0: 20:05:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:28 executing program 3: 20:05:28 executing program 4: 20:05:28 executing program 5: 20:05:28 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x0, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:28 executing program 0: 20:05:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:28 executing program 3: 20:05:28 executing program 4: 20:05:28 executing program 5: 20:05:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:28 executing program 0: 20:05:28 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x0, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:28 executing program 3: 20:05:28 executing program 5: 20:05:29 executing program 4: 20:05:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:29 executing program 3: 20:05:29 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x0, 0x200000004, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:29 executing program 0: 20:05:29 executing program 5: 20:05:29 executing program 4: 20:05:29 executing program 3: 20:05:29 executing program 0: 20:05:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:29 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x0, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:29 executing program 5: 20:05:29 executing program 4: 20:05:29 executing program 3: 20:05:29 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x0, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:29 executing program 0: 20:05:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:29 executing program 5: 20:05:29 executing program 4: 20:05:29 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x0, 0x8001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:29 executing program 0: 20:05:29 executing program 3: 20:05:30 executing program 5: 20:05:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:30 executing program 4: 20:05:30 executing program 3: 20:05:30 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:30 executing program 0: 20:05:30 executing program 5: 20:05:30 executing program 4: 20:05:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:30 executing program 3: 20:05:30 executing program 5: 20:05:30 executing program 0: 20:05:30 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:30 executing program 4: 20:05:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:30 executing program 5: 20:05:30 executing program 0: 20:05:30 executing program 3: 20:05:30 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x19, 0x4, 0x200000004, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x7b37, 0x80ffff, 0x48c4]}, 0x3c) 20:05:30 executing program 4: 20:05:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:30 executing program 5: 20:05:31 executing program 3: 20:05:31 executing program 0: 20:05:31 executing program 2: 20:05:31 executing program 4: 20:05:31 executing program 5: 20:05:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:31 executing program 3: 20:05:31 executing program 2: 20:05:31 executing program 0: 20:05:31 executing program 4: 20:05:31 executing program 5: 20:05:31 executing program 2: 20:05:31 executing program 3: 20:05:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:31 executing program 0: 20:05:31 executing program 4: 20:05:31 executing program 2: 20:05:31 executing program 3: 20:05:31 executing program 5: 20:05:31 executing program 0: 20:05:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a8221"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:32 executing program 4: 20:05:32 executing program 5: 20:05:32 executing program 2: 20:05:32 executing program 3: 20:05:32 executing program 4: 20:05:32 executing program 5: 20:05:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a8221"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:32 executing program 0: 20:05:32 executing program 2: 20:05:32 executing program 4: 20:05:32 executing program 3: 20:05:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a8221"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:32 executing program 5: 20:05:32 executing program 0: 20:05:32 executing program 2: 20:05:32 executing program 3: 20:05:32 executing program 4: 20:05:32 executing program 5: 20:05:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x19, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:32 executing program 0: 20:05:32 executing program 3: 20:05:33 executing program 4: 20:05:33 executing program 2: 20:05:33 executing program 5: 20:05:33 executing program 0: 20:05:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x19, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:33 executing program 3: 20:05:33 executing program 4: 20:05:33 executing program 5: 20:05:33 executing program 2: 20:05:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x19, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:33 executing program 3: 20:05:33 executing program 0: 20:05:33 executing program 4: 20:05:33 executing program 2: 20:05:33 executing program 5: 20:05:33 executing program 3: 20:05:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:33 executing program 0: 20:05:33 executing program 4: 20:05:33 executing program 5: 20:05:34 executing program 3: 20:05:34 executing program 2: 20:05:34 executing program 4: 20:05:34 executing program 5: 20:05:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:34 executing program 0: 20:05:34 executing program 3: 20:05:34 executing program 2: 20:05:34 executing program 4: 20:05:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:34 executing program 0: 20:05:34 executing program 5: 20:05:34 executing program 3: 20:05:34 executing program 2: 20:05:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:34 executing program 4: 20:05:34 executing program 0: 20:05:34 executing program 5: 20:05:34 executing program 3: 20:05:34 executing program 4: 20:05:34 executing program 2: 20:05:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:34 executing program 5: 20:05:35 executing program 3: 20:05:35 executing program 0: 20:05:35 executing program 4: 20:05:35 executing program 2: 20:05:35 executing program 5: 20:05:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:35 executing program 3: 20:05:35 executing program 0: 20:05:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 20:05:35 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:05:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x48, 0x65}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffea2}, 0x48) 20:05:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0xfffffffe}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r0, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) 20:05:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getae={0x40, 0x1f, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d5, 0xa, 0x32}, @in=@remote, 0x81}}, 0x40}}, 0x0) 20:05:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:35 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, 0x0) ftruncate(r2, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$void(0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) 20:05:35 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x4, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) 20:05:35 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:05:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:35 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) 20:05:35 executing program 2: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x3) dup2(r2, r1) 20:05:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'lo\x00'}) 20:05:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:36 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000012c0)=ANY=[@ANYBLOB="d00800002400ffffff0300000000ffffa6fffff7", @ANYRES32=r1, @ANYBLOB="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"], 0x8d0}}, 0x0) r2 = socket(0x1000000010, 0x80003, 0x0) sendmmsg$alg(r2, &(0x7f0000000100), 0x492492492492711, 0x0) 20:05:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002180)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 20:05:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000280), 0x4) 20:05:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000240)=' ', &(0x7f0000000400)='\a'}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000500), &(0x7f0000000000)="10"}, 0x20) 20:05:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x40fdf) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 20:05:36 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0xc9e4, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@shortname_mixed='shortname=mixed'}, {@shortname_lower='shortname=lower'}], [{@appraise='appraise'}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr'}}]}) 20:05:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000040)=0xfffffffa, 0x4) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) recvmsg(r2, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x40002102) [ 316.617902][T11377] FAT-fs (loop2): Unrecognized mount option "appraise" or missing value 20:05:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 316.825998][T11389] FAT-fs (loop2): Unrecognized mount option "appraise" or missing value 20:05:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 316.923023][T11395] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:05:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='reno\x00', 0x5) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:05:37 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000e40)=ANY=[@ANYBLOB="d00800002400ffffff0300000000ffffa6fffff7", @ANYRES32=r1, @ANYBLOB="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"], 0x8d0}}, 0x0) r2 = socket(0x1000000010, 0x80003, 0x0) sendmmsg$alg(r2, &(0x7f0000000100), 0x492492492492711, 0x0) 20:05:37 executing program 4: sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 20:05:37 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0xc9e4, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@shortname_mixed='shortname=mixed'}, {@shortname_lower='shortname=lower'}], [{@appraise='appraise'}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr'}}]}) 20:05:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x1c}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:05:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001043, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x40000, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000540)={0x6, {{0x2, 0x4e23, @multicast2}}, 0x1, 0x7, [{{0x2, 0x4e22, @remote}}, {{0x2, 0x4e23, @dev}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e20}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x0, @loopback}}]}, 0x410) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000340)={'veth1_to_batadv\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 317.256540][T11410] FAT-fs (loop2): Unrecognized mount option "appraise" or missing value 20:05:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xd}, 0xfffffffffffffe17) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) 20:05:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:37 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x8, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) 20:05:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:37 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="5400000000010000000000000000000000000000300001"], 0x1}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28090000580001"], 0x1}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:05:37 executing program 4: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000000010000000000000000000000000000300001002c0001001400150016"], 0x1}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000000)=ANY=[@ANYBLOB="480000000206010000000000000000000000000000000500020000000f0003"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x20, 0xffff}, @window, @mss], 0x3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x21, 0x1f}], 0x1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:05:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x82) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040000", 0x5) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) [ 317.670179][T11432] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 317.683869][T11432] batman_adv: batadv0: Removing interface: batadv_slave_0 20:05:38 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) [ 317.803672][T11432] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 317.845367][T11432] batman_adv: batadv0: Removing interface: batadv_slave_1 20:05:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:38 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 317.903342][T11453] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 317.935393][T11453] netlink: 2305 bytes leftover after parsing attributes in process `syz-executor.0'. 20:05:38 executing program 0: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0x6c7}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x3) dup2(r1, r0) [ 318.389990][T11457] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value [ 318.556492][T11464] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value [ 318.823271][T11455] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 20:05:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001043, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x40000, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000540)={0x6, {{0x2, 0x4e23, @multicast2}}, 0x1, 0x7, [{{0x2, 0x4e22, @remote}}, {{0x2, 0x4e23, @dev}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e20}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x0, @loopback}}]}, 0x410) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000340)={'veth1_to_batadv\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:05:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4d}, [@ldst={0x3, 0x3, 0x3, 0xa, 0xa, 0xff00}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 20:05:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x30, 0x30, 0x1, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_simple={0x18, 0x1, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) 20:05:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0x98, 0x98, 0x0, 0x98, 0x190, 0x190, 0x190, 0x190, 0x190, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x288) 20:05:39 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 319.205383][T11496] Cannot find add_set index 0 as target 20:05:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x25}, [@ldst={0x3, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 319.362763][T11494] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:39 executing program 0: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0x2a7}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x3) dup2(r1, r0) 20:05:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:39 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r1 = socket$kcm(0xa, 0x1, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffff58) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8916, &(0x7f0000000000)={r2}) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000200)=0x1) r5 = socket$kcm(0x10, 0x400000002, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000240)) sendmsg$kcm(r5, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f00000001c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @random="b745061e39a6", 'macvtap0\x00'}}, 0xfffffffffffffe9b, &(0x7f0000000080), 0x0, &(0x7f0000002800)=[{0x80, 0x103, 0x2, "f6a4ef9f0b2e3fc6229de60f6211ee2ab7236998ba80688bb3181ddd7b6d6b8ba43d73d70e658df3c36ec96725f84836551ae9b91742686c6cc1c1ca797c5599c5248ec82d379ba72c71ad0d34be920025ea8471b99f2aa071bf60d32ac43cb653210fafb28a69f49245970f"}, {0x1020, 0x10c, 0xffffffff, "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"}, {0x10, 0x108, 0x3}, {0x110, 0x118, 0x40, "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"}, {0xffffff48, 0x10b, 0xec6d, "4e1aff12d30e56d382bf6a1ccd184c7190897d9f7111ed7fb383d4d5bafb8e64c209c3459fe6a8a5023928525ffc6d89669926ec992ad8881c502ea5ee8d91cf170303dac30291c7cdf5292587a48ab51774fbce04937f8e3ec0f91781b6b21918b8ab41cb05c38f971ef8ff01a859329246937248c4e3cbe1ce8bd249124605675a18a907c54d861b41a7afca221f48f4e4c634a265465296160ac2f00aff"}], 0x1270}, 0x4000010) 20:05:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:39 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000002c0)={@broadcast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}}, 0x0) 20:05:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x4, 0x400, 0xc}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f00000003c0), &(0x7f0000000100)}, 0x20) [ 319.712417][T11519] device lo entered promiscuous mode 20:05:40 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:40 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:40 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @multicast2, @local}, 0xc) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000880)=""/223) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000500)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000, 0x2]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:05:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000fc0)=@raw={'raw\x00', 0x2, 0x3, 0x288, 0x150, 0x0, 0x0, 0x150, 0x0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64], 0x0, 0xe8, 0x150, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'gretap0\x00', {0x20, 0xc8f9, 0x0, 0x0, 0x0, 0x6, 0x5}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x380) 20:05:40 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 320.211144][T11554] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 320.219009][T11560] xt_CT: You must specify a L4 protocol and not use inversions on it [ 320.278001][T11544] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:40 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x1, 0x4, 0x6, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, &(0x7f0000000240)}, 0x20) 20:05:41 executing program 2: r0 = socket$inet(0x10, 0x10000000003, 0x9) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000340)="24000000340807041dfffdd46fa2830020200a0009ed0300001d85680c1ba3a20400ff7e28000000530403000000a0aa1c0009b356da5a80d18b6e064467bee28f803b5ee9fd62662455a4df", 0x4c}], 0x1}, 0x0) 20:05:41 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r0, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) [ 321.057415][ T27] audit: type=1107 audit(1582056341.291:58): pid=11596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='VÚZ€Ñ‹nDg¾â€;^éýbf$U¤ß' [ 321.112193][ T27] audit: type=1107 audit(1582056341.321:59): pid=11596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='VÚZ€Ñ‹nDg¾â€;^éýbf$U¤ß' 20:05:41 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:41 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0x5e9}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x3) dup2(r1, r0) 20:05:41 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0xc9e4, 0x0, &(0x7f0000001580), 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}], [{@appraise='appraise'}]}) 20:05:41 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @multicast2, @local}, 0xc) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000880)=""/223) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000500)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000, 0x2]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:05:41 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 321.586508][T11613] FAT-fs (loop2): Unrecognized mount option "appraise" or missing value 20:05:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x8, 0x6, 0xa48b98b7d71166b7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:05:42 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) [ 321.850405][T11637] FAT-fs (loop2): Unrecognized mount option "appraise" or missing value 20:05:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0xe, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xad}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffd71}, {0x0, 0x1e1}, {&(0x7f00000002c0)=""/66, 0x9}], 0x3, 0x0, 0xb9, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 321.933536][T11624] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:42 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) 20:05:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 20:05:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 20:05:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 322.336048][T11665] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:05:42 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 322.500384][T11671] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:42 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) 20:05:42 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 323.058969][T11697] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:45 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0xc9e4, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@shortname_lower='shortname=lower'}], [{@appraise='appraise'}]}) 20:05:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0}) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000002c0)={r3}, 0x10) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000001840), &(0x7f0000003480)=0x10) 20:05:45 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) 20:05:45 executing program 2: 20:05:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:45 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000500)}, 0x20) 20:05:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 325.454806][T11726] FAT-fs (loop4): Unrecognized mount option "appraise" or missing value [ 325.491388][T11723] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value [ 325.763449][T11751] FAT-fs (loop4): Unrecognized mount option "appraise" or missing value 20:05:46 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0xc9e4, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@shortname_lower='shortname=lower'}], [{@appraise='appraise'}]}) 20:05:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:46 executing program 2: 20:05:46 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:46 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000500)}, 0x20) 20:05:46 executing program 2: 20:05:46 executing program 2: 20:05:46 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000500)}, 0x20) 20:05:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:46 executing program 2: [ 326.305678][T11766] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 326.363492][T11783] FAT-fs (loop4): Unrecognized mount option "appraise" or missing value 20:05:46 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0xc9e4, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@shortname_lower='shortname=lower'}], [{@appraise='appraise'}]}) 20:05:46 executing program 2: 20:05:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:46 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:47 executing program 2: 20:05:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 326.870455][T11814] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 326.968511][T11804] FAT-fs (loop4): Unrecognized mount option "appraise" or missing value 20:05:47 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:47 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:47 executing program 2: 20:05:47 executing program 4: 20:05:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 20:05:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:47 executing program 2: [ 327.424774][T11843] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:47 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 20:05:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:47 executing program 2: 20:05:48 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:48 executing program 4: 20:05:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:48 executing program 4: 20:05:48 executing program 2: [ 328.033601][T11877] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) 20:05:48 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:48 executing program 4: 20:05:48 executing program 2: 20:05:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:48 executing program 4: 20:05:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0xd76e5bb, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x296, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x28) [ 328.691965][T11903] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:49 executing program 2: 20:05:49 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:49 executing program 4: 20:05:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:49 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:49 executing program 2: 20:05:49 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:49 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:49 executing program 4: 20:05:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:49 executing program 2: 20:05:49 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:49 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:49 executing program 4: 20:05:49 executing program 2: [ 329.625063][T11947] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:50 executing program 3: syz_open_dev$vcsa(0x0, 0x200, 0x600002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:50 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:50 executing program 4: 20:05:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:50 executing program 2: 20:05:50 executing program 2: 20:05:50 executing program 4: 20:05:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:50 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:50 executing program 2: [ 330.430570][T12001] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:50 executing program 4: 20:05:50 executing program 2: 20:05:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:50 executing program 4: 20:05:50 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x6f, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:51 executing program 2: 20:05:51 executing program 4: 20:05:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:51 executing program 2: [ 331.092329][T12032] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x6f, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:51 executing program 4: 20:05:51 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/242, 0xf2}], 0x1, 0x0) 20:05:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000140)='tmpfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={[{@mode={'mode', 0x3d, 0x8004000000000000}}]}) 20:05:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x6f, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:51 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 331.621922][T12073] tmpfs: Bad value for 'mode' 20:05:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db6", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 331.907121][T12072] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:52 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:52 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') fstat(r0, &(0x7f0000002580)) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_adj\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x700) 20:05:52 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x8) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x0, 0x0, 0x0, {{@in6=@ipv4}, {@in6=@local}, @in=@multicast1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}}}]}, 0x13c}}, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="07010000060000000000000000000000000000000000100008000000000000000529"], 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 20:05:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db6", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db6", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:52 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c", 0x2}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) memfd_create(0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 20:05:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 332.419807][T12127] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909e", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:52 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:52 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) [ 332.927725][T12159] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909e", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:53 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, 0x1, 0x8, 0xfffffffffffffffd}, 0x14}}, 0x0) 20:05:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:53 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)) epoll_pwait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 20:05:53 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:53 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909e", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 333.280674][T12180] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:53 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:53 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0xffffffffffffff43) pipe(0x0) 20:05:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadf", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:53 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadf", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) [ 333.725034][T12213] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:54 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)) epoll_pwait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 20:05:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadf", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:54 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) [ 334.156531][T12239] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:54 executing program 2: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f000001fe80)=[{{&(0x7f00000002c0)=@hci, 0x80, &(0x7f0000000440)=[{&(0x7f0000000340)=""/116, 0x74}, {&(0x7f0000000180)=""/64, 0x40}, {&(0x7f0000000200)=""/24, 0x18}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/16, 0x10}, {&(0x7f0000000400)=""/14, 0xe}], 0x6, &(0x7f0000000540)=""/23, 0x17}, 0x5}, {{&(0x7f0000000580)=@vsock, 0x80, &(0x7f0000000900)=[{0xffffffffffffffff}, {&(0x7f000001ea40)=""/155, 0x9b}, {&(0x7f00000006c0)=""/211, 0xd3}, {&(0x7f00000007c0)=""/31, 0x1f}, {&(0x7f0000000800)=""/195, 0xc3}], 0x5, &(0x7f0000000980)=""/70, 0x46}, 0x401}, {{0x0, 0x0, 0x0}}], 0x3, 0x40020101, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x4}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) msgctl$IPC_RMID(0x0, 0x0) msgget(0x2, 0x2) r5 = msgget$private(0x0, 0x10) msgctl$IPC_RMID(r5, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:05:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:54 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:54 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)) epoll_pwait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 20:05:54 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{0x0}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) [ 334.701377][T12263] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:55 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{0x0}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 335.078375][T12290] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28265 sclass=netlink_route_socket pid=12290 comm=syz-executor.2 [ 335.256461][T12297] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:56 executing program 2: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f000001fe80)=[{{&(0x7f00000002c0)=@hci, 0x80, &(0x7f0000000440)=[{&(0x7f0000000340)=""/116, 0x74}, {&(0x7f0000000180)=""/64, 0x40}, {&(0x7f0000000200)=""/24, 0x18}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/16, 0x10}, {&(0x7f0000000400)=""/14, 0xe}], 0x6, &(0x7f0000000540)=""/23, 0x17}, 0x5}, {{&(0x7f0000000580)=@vsock, 0x80, &(0x7f0000000900)=[{0xffffffffffffffff}, {&(0x7f000001ea40)=""/155, 0x9b}, {&(0x7f00000006c0)=""/211, 0xd3}, {&(0x7f00000007c0)=""/31, 0x1f}, {&(0x7f0000000800)=""/195, 0xc3}], 0x5, &(0x7f0000000980)=""/70, 0x46}, 0x401}, {{0x0, 0x0, 0x0}}], 0x3, 0x40020101, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x4}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) msgctl$IPC_RMID(0x0, 0x0) msgget(0x2, 0x2) r5 = msgget$private(0x0, 0x10) msgctl$IPC_RMID(r5, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:05:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c80011", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:56 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)) epoll_pwait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 20:05:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:56 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{0x0}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c80011", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 335.943423][T12324] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:56 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) [ 336.109725][T12344] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28265 sclass=netlink_route_socket pid=12344 comm=syz-executor.2 20:05:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c80011", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) [ 336.433569][T12357] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:57 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write$P9_RLCREATE(r0, 0x0, 0xffffffffffffff43) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x4139569a) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) 20:05:57 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)) 20:05:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:57 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:57 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) [ 337.078554][T12373] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0x0, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:58 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) getpid() vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:05:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:58 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:05:58 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000840)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0x0, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000840)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0x0, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", &(0x7f0000000040)}, 0x40) 20:05:58 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) [ 338.030584][T12415] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:05:58 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:05:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000840)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 338.654505][T12453] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000080)=0x800, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) sendmsg$GTP_CMD_GETPDP(r1, 0x0, 0x4000884) syz_open_procfs(0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 20:05:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 20:05:59 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) 20:05:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:59 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:05:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) [ 339.124111][ T27] audit: type=1800 audit(1582056359.361:60): pid=12456 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16804 res=0 20:05:59 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:05:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 20:05:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:05:59 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500)}, 0x20) [ 339.367880][T12472] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:05:59 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:05:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) [ 339.907921][T12506] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:00 executing program 2: syz_emit_ethernet(0x16, &(0x7f0000000000)={@random="1c118879d3cf", @broadcast}, 0x0) syz_emit_ethernet(0x12, &(0x7f0000000040)={@dev, @remote, @val={@void}}, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000001780)=ANY=[@ANYBLOB="ffffffffffcc8f8ba200000086dd60dc9ae700283a001bfffaa7c4987f6a2e7b5f0bc485b703ff0200000000000000000000000000018900907a00000000fe880000000000000000000000000001fe8000000000000000000000000000aa"], 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_emit_ethernet(0x56, &(0x7f0000000180)={@local, @dev, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "4fef7c", 0x20, 0x6, 0x0, @remote, @rand_addr="ed876789b2149d6f4841ccd82210e5b0", {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 20:06:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 20:06:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:00 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 20:06:00 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000040)}, 0x40) 20:06:00 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 20:06:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000040)}, 0x40) 20:06:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x20, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x68, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x68}}, 0x0) 20:06:00 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:00 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 340.465134][T12530] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000040)}, 0x40) 20:06:00 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x20, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffe1e, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000b00010067726574617000001400020008000100", @ANYRES32=r3, @ANYBLOB="08000700ffffffff08000a00", @ANYRES32=r3, @ANYBLOB="6ec8192b707bddfe6d3c2bfb6a8cfe701bc64c4debadf7805e0fa24564b3a23cce9a2e17d7ee4b8357b93171f5b5656f2b03d99a4ce3c68d3832de5601bb8a2d2ef0c818becdb89aacfcc252f6f2b925b4e5c336799cf97694662d98752b54a03bceca24756fffd35ba0d035a835bf21a764f02f8e805d2a499223915d9d3663f001d92512c5769c51777d9c9d0b4b116f0b8f74febafd4e19781c21e142f2e23d225b2dbde2d191c6fba843eb0765ba6d24237317cbabdd2a10aa71559aae09e775a0f7c25893f35a7e43ff673cf8e1733b0ac5f6b52bed00862f76c1d285"], 0x4c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) socket$inet6(0xa, 0x80003, 0x6b) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 20:06:01 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000500)}, 0x20) 20:06:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0xf, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc35", &(0x7f0000000040)}, 0x40) 20:06:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x20, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 340.981044][T12578] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 341.059717][T12586] bond1: (slave gretap1): Enslaving as a backup interface with an up link 20:06:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0xf, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc35", &(0x7f0000000040)}, 0x40) [ 341.115038][T12578] bond1 (unregistering): (slave gretap1): Releasing backup interface 20:06:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0xf, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc35", &(0x7f0000000040)}, 0x40) 20:06:01 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000500)}, 0x20) 20:06:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x17, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636c", &(0x7f0000000040)}, 0x40) [ 341.363740][T12580] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) [ 341.555442][T12578] bond1 (unregistering): Released all slaves [ 341.582898][T12614] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value [ 341.752090][T12586] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 20:06:02 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:02 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000500)}, 0x20) 20:06:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x17, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636c", &(0x7f0000000040)}, 0x40) [ 341.996611][T12623] bond1 (unregistering): Released all slaves 20:06:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, 0x6, 0x6, 0x1}, 0x14}}, 0x0) 20:06:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x17, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636c", &(0x7f0000000040)}, 0x40) 20:06:02 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) 20:06:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:02 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 20:06:02 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1b, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d9891", &(0x7f0000000040)}, 0x40) 20:06:02 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) 20:06:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1b, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d9891", &(0x7f0000000040)}, 0x40) [ 342.726322][T12645] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:03 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="1400000003efa8c68d000000000000000000000a2000000003070105000000f787060000000000000900010073627a3000000000840000000008"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000200)={{0x14, 0x606}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_DELRULE={0x14}, @NFT_MSG_NEWRULE={0x3f8, 0x6, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_RULE_COMPAT={0xc, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8}]}, @NFTA_RULE_EXPRESSIONS={0x178, 0x4, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@connlimit={{0xe, 0x1, 'connlimit\x00'}, @val={0x25, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8}]}}]}, {0xc4, 0x1, 0x0, 0x1, [@fwd={{0x8, 0x1, 'fwd\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_FWD_NFPROTO={0x8}, @NFTA_FWD_SREG_DEV={0x8}, @NFTA_FWD_SREG_ADDR={0x8}]}}, @queue={{0xa, 0x1, 'queue\x00'}, @void}, @payload={{0xc, 0x1, 'payload\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_SREG={0x8}, @NFTA_PAYLOAD_CSUM_OFFSET={0x8}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_DREG={0x8}, @NFTA_PAYLOAD_SREG={0x8}, @NFTA_PAYLOAD_CSUM_FLAGS={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}, @dynset={{0xb, 0x1, 'dynset\x00'}, @val={0x4}}, @redir={{0xa, 0x1, 'redir\x00'}, @void}, @byteorder={{0xe, 0x1, 'byteorder\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_LEN={0x8}, @NFTA_BYTEORDER_DREG={0x8}]}}]}, {0x68, 0x1, 0x0, 0x1, [@exthdr={{0xb, 0x1, 'exthdr\x00'}, @void}, @exthdr={{0xb, 0x1, 'exthdr\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OP={0x8}, @NFTA_EXTHDR_FLAGS={0x8}, @NFTA_EXTHDR_FLAGS={0x8}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_DREG={0x8}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_OP={0x8}]}}]}]}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8}, @NFTA_RULE_COMPAT_FLAGS={0x8}]}, @NFTA_RULE_EXPRESSIONS={0x238, 0x4, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@meta={{0x9, 0x1, 'meta\x00'}, @void}, @notrack={{0xc, 0x1, 'notrack\x00'}, @void}, @range={{0xa, 0x1, 'range\x00'}, @void}, @cmp={{0x8, 0x1, 'cmp\x00'}, @void}, @payload={{0xc, 0x1, 'payload\x00'}, @void}]}, {0x1b4, 0x1, 0x0, 0x1, [@reject={{0xb, 0x1, 'reject\x00'}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_REJECT_ICMP_CODE={0x5}, @NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_ICMP_CODE={0x5}, @NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_ICMP_CODE={0x5}, @NFTA_REJECT_TYPE={0x8}]}}, @range={{0xa, 0x1, 'range\x00'}, @void}, @match={{0xa, 0x1, 'match\x00'}, @void}]}, {0x44, 0x1, 0x0, 0x1, [@meta={{0xffffffffffffff6d, 0x1, 'meta\x00'}, @void}, @notrack={{0xc, 0x1, 'notrack\x00'}, @void}, @dup={{0x8, 0x1, 'dup\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8}, @NFTA_DUP_SREG_DEV={0x8}]}}, @dynset={{0xb, 0x1, 'dynset\x00'}, @void}]}]}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELCHAIN={0xd8, 0x5, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_COUNTERS={0x40, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_PACKETS={0xc}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_HOOK={0x7c, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'ip6erspan0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth0_to_hsr\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'vxcan1\x00'}]}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x0, 0x0, 0x0, {}, @NFT_OBJECT_CT_HELPER=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}], {0x14}}, 0x54c}}, 0x0) 20:06:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:03 executing program 4: r0 = epoll_create1(0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:03 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) 20:06:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1b, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d9891", &(0x7f0000000040)}, 0x40) 20:06:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1d, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ec", &(0x7f0000000040)}, 0x40) 20:06:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}], 0x10) 20:06:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:03 executing program 4: r0 = epoll_create1(0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:03 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500), 0x0}, 0x20) 20:06:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000956bff6ef84a4fefa12f302537cd55d390d5fc14948d6a822186f17b1f47d26ffb75d0204b85bc6b23ce5f7ec22922379970ffa9c43460be3a59bc7153a184b4a88071e1cc5df8b928cfa23f276fedd018faa61d11fc6495bbf74393b4184a5312a54cc9b30573a55b66a12085c8bd82d9d0394972f64c7cc5e822fe400d7df21a0f9ccc02a0db28bab056074def7635812b67e0f33f9a63a0588bdea782b433be"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1d, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ec", &(0x7f0000000040)}, 0x40) 20:06:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1d, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ec", &(0x7f0000000040)}, 0x40) 20:06:04 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500), 0x0}, 0x20) 20:06:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", 0x0}, 0x40) 20:06:04 executing program 4: r0 = epoll_create1(0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3d, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:04 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x5cc}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) recvfrom$inet6(r0, 0x0, 0xfffffd66, 0x0, 0x0, 0x0) 20:06:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3d, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:04 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500), 0x0}, 0x20) 20:06:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", 0x0}, 0x40) 20:06:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:04 executing program 4: r0 = epoll_create1(0x0) close(0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x4000201f}) 20:06:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000b00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab84d96618bda75dc036dcb82cd8f7c6160413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53ba", 0x0, 0xfe, 0x0, 0x1e, 0x0, &(0x7f00000001c0)="51e75db6a85dbfd05c646cbe00cc354e6238d48903636cac5d989164ecbf", 0x0}, 0x40) 20:06:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3d, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 344.566102][T12781] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 20:06:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) [ 344.619346][T12781] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.2'. [ 344.665214][T12781] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 20:06:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000640)="e0", 0x1, 0x40007bd, 0x0, 0x0) [ 344.710801][T12781] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.2'. 20:06:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x12022) 20:06:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3f, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 344.771988][T12787] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 344.798228][T12787] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.2'. [ 344.948378][T12781] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 345.012640][T12781] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.2'. [ 345.025128][T12807] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 345.081774][T12781] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 345.098505][T12781] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.2'. 20:06:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080601040000000000000000000000000500010007000000"], 0x1c}}, 0x0) 20:06:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000640)="e0", 0x1, 0x40007bd, 0x0, 0x0) 20:06:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}, {@rodir='rodir'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:05 executing program 4: r0 = epoll_create1(0x0) close(0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x4000201f}) 20:06:05 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @icmp={{0xc, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @empty, @multicast1, {[@timestamp_addr={0x44, 0x1c, 0x11, 0x1, 0x0, [{@multicast2}, {@empty}, {@empty}]}]}}, @address_request}}}}, 0x0) 20:06:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3f, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3f, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000640)="e0", 0x1, 0x40007bd, 0x0, 0x0) 20:06:05 executing program 1: 20:06:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:05 executing program 2: 20:06:05 executing program 4: r0 = epoll_create1(0x0) close(0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x4000201f}) 20:06:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be6"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:05 executing program 1: 20:06:05 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)="057f53302a63bbddc670000002", 0xd, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1ba0000014001d0d89fdc5cbdd045798707bed4dca14a7960f0f8ec8da78031c76", 0x21, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890c, &(0x7f0000000080)={'wg2\x00'}) 20:06:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000640)="e0", 0x1, 0x40007bd, 0x0, 0x0) [ 345.672910][T12842] FAT-fs (loop3): bogus number of reserved sectors [ 345.682239][T12842] FAT-fs (loop3): Can't find a valid FAT filesystem 20:06:06 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}}}}}}, 0x0) 20:06:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be6"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 20:06:06 executing program 2: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0x6c7}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x3) dup2(r1, r0) 20:06:06 executing program 1: 20:06:06 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:06 executing program 0: 20:06:06 executing program 1: [ 346.392761][T12870] FAT-fs (loop3): bogus number of reserved sectors [ 346.421014][T12870] FAT-fs (loop3): Can't find a valid FAT filesystem 20:06:06 executing program 0: 20:06:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:06 executing program 1: 20:06:06 executing program 2: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000740)="1ca2a9efaa16de48345522a64503cb9516bdec3f585fa7a4d4036e8d2ba2cfa968a3a3b2bcd310f02d9badae2deffd49a09986228427d1e13027cec91a8b2415390587de45639a98096b5b75d131b65e20aaaea9bd3f63617a8daff6c2d2c37b8683a178eec2637bb72e3ec4b1864de630346507dfef20018f9ba782274f636bc72e4c83593b7666b3743f2c95a4f11814495dc0f8c2ac1b9e914aaf333d3c231000eae9e749453f957160c2bba47d8720dd4c88bd5b4c470afb8ee12c0fb76f9e1a5a7c1d9df7c91aafe99b579d4ee3e5c8dc0243074087142cb3fb3d3c5b05851babe07ead0c124ec7cf74eae50f1c02b194c70d192ac514bbef9d0d8d0bc8381b9e89bec2d8a1955a8c8974f49be58b9b75dc1ba345b51054636729f1d7fd265db853bcda48d2d031f44a790b674f41eb8be85661bd6fb5edf4ca876541993386d472a858b5daa1522dc0ddb23ed1669e588e4e48b598758d7adf8c8291fd00ffba0e0c140c8b09f38e84dfa21e841bf48d71956c7b9f7f1451e2fca67ed715e9a9185487cb4a211d218cdc797e960c48cae7916982441304f2ba6d353c2602a4071f0f7d96406fe2ca2c5c075dced271e89d55400230c1aafcc5499da5474e0e183fd9159a6b0ecacecf8aa1f8c2b436ee961f2787893489c07419291eeda465fc85545edfd7c09f88ef717418b4e8a68b9b9950b1f035328302faf993893dcf4ab5b2f6f01ec6c6caffb26e4ca8f75a29e2294733bf6f23e5d1f59aaeafa945468a43f7a4de4fe4993d1dd638268f5391eaa2890ffa637031c86fb15f389275068ae2d36df5bdc63d7677f9a0c153be1d18814c49ba5622a8a24278875b73108e02a52d91eaed9834bfe55817a7bbec3f126eb3b9e08f7780b926af4c8728bfa64944a55ca93a2cc27ed2f9ef1f709b0c2e3f2569fc72efe73b18018eb79b93260f4b2b018bb06e79c4eb23945cd1b04dc45f72df11cd1fd88cff2082e45174e9d75fb9bcba5f006ead4b9683d67cb316f72ff9162907b64df61eed0cc0f100ba47d2968e3bfd74b555180a4232370125f44701797e680b4fbb2cae9828b5d28f72e5de8f466296f53fa67781b36789580710ff3efa1a55a7f70e69ddebc352d6468020104d6e58bf3c6e437e947786488991847eb90a02e0d67979dbbd413b341098ae9c5ec132e51cae7ecd62ea273c14a40d9881b1ac634b0482c2d8ddf147dcdb5aedde14e2ac1c97dd5e13f7e9eca9a5ebe2a13f51ff5db1bd563e057440fbecb786891183c1fac58efe8e72b3a7fdab011412972ff74ae4149323a5440eb586f5000a4f9fb0c5ee57d2f456f322755800c376192b4e06467d21945b8bbf59d96bfee8045ba3b82f1da59ed8dfe57f44db583cceb1e36a54c96e98bf26cb6b7ffa4437472843296f9c841909bbe84bb154daa13fef2e238a553044d63e203572de41e8603237acc38a7c6b999e6fe5b3e80f51f15e5b3edc4cbfcfc27fc9311daa6b4dc5e8243198072c9121b1e9f66e07a945d72ecdd8668c3122f9740b9de7705b3f5893f2524b922ec363ccd7cd60499fd2914534df1641080a3134dcef0b942b5f487bab16b9512bb93206d371230f195d02f9b3a1b7468c07593d7330a14ac93186d98f1d33e9e3e692975ee285fcb1e9fa434c30ab24c69103793e8ad019f7d1d8d4a66e4484d5e6e1c35d9001cfaf562df742f23d75b24604e5f6c7a2e9ebb10e4eea345e5d24dd809b9d2e0d924b8e5f8515ca677ca4cd5d7f292a25a18593699030b56443e9de34cc540b91e8f7b6272e645b2afd5420ad2fca3377b2e08b10b9b31a461eb101f524037fa851ef0f0739bf37cd456fcedf8276cf9e70a26f525f0ca7d560223c82d876f82b33d4720412de431fa5c71d92dcf8bb8cfc42a7b98d84e6e2a8bf68231f69539e61efc34aa84f1e00e3bae396f33fbdabf09001698684db5797f56f948a3cecee4a8f45b5ef72ba80973cee0c084d5491345d88b6c13622e435da048da1c704b41f03d43466b009960fa62521c6a7f791215a731bdf60faaf7986b1b8408ee397699ba87e3b1faaf0065cb2d7299f39eaefaec338d914d9d09b89aa2ff18e9bb2858b2a020eab9cf1b59b2a51c1968ae5931c5d12217fda58660a1781047cd42b3ab31cc360db14caf7678e234281db0091f34656d8f352b3fdf2aa13cfa522343b29fab65ebff99768b30d8db57edceba63af46aabf1ee5472e347adc501baabf7ac712035ca607143f9e2624e43f5f36f6b1b9b473c4ee0a4bed0d87a28a910679e8296e8b00f3b13ec96a64454dc31df4a4ff6825412a97d4e538205d8f3a5bb418160c5c461271766b7ee5ebb59975997552eda210ac1ac285ea0f5ffbc5b3b7a34b784999cae1557d479993faf75105f5b6727b8fb9bc4d30af2f893074030f4ebb850bf763cb784b8e595309a78c3c8", 0x6c7}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x3) dup2(r1, r0) 20:06:07 executing program 0: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0x6c7}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x3) dup2(r1, r0) 20:06:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:07 executing program 1: 20:06:07 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:07 executing program 1: 20:06:07 executing program 2: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0x6c7}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x3) dup2(r1, r0) [ 347.158004][T12907] FAT-fs (loop3): bogus number of reserved sectors [ 347.207650][T12907] FAT-fs (loop3): Can't find a valid FAT filesystem 20:06:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:07 executing program 1: 20:06:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:07 executing program 0: 20:06:07 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:07 executing program 1: 20:06:07 executing program 2: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x83e41, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0x6c7}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x3) dup2(r1, r0) 20:06:08 executing program 0: [ 347.765786][T12951] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:08 executing program 1: 20:06:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:08 executing program 2: 20:06:08 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:08 executing program 0: [ 348.188743][T12971] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:08 executing program 0: 20:06:08 executing program 1: 20:06:08 executing program 2: 20:06:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:08 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:08 executing program 1: 20:06:08 executing program 0: 20:06:08 executing program 2: 20:06:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:08 executing program 1: 20:06:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 348.711586][T12993] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:09 executing program 2: 20:06:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:09 executing program 0: 20:06:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:09 executing program 1: 20:06:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:09 executing program 0: 20:06:09 executing program 2: 20:06:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:09 executing program 1: [ 349.308924][T13025] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:09 executing program 1: 20:06:09 executing program 2: 20:06:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:09 executing program 0: 20:06:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:09 executing program 0: 20:06:09 executing program 2: 20:06:09 executing program 1: 20:06:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:10 executing program 0: [ 349.866910][T13056] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:10 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:10 executing program 0: 20:06:10 executing program 1: 20:06:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:10 executing program 2: 20:06:10 executing program 1: 20:06:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:10 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:10 executing program 0: 20:06:10 executing program 2: 20:06:10 executing program 1: 20:06:10 executing program 0: 20:06:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:10 executing program 0: 20:06:10 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:10 executing program 2: [ 350.728114][T13091] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:11 executing program 1: 20:06:11 executing program 0: 20:06:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:11 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:11 executing program 2: 20:06:11 executing program 1: 20:06:11 executing program 0: 20:06:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:11 executing program 4: r0 = epoll_create1(0x0) epoll_create1(0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:11 executing program 2: 20:06:11 executing program 1: [ 351.289193][T13129] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:11 executing program 0: 20:06:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:11 executing program 2: 20:06:11 executing program 1: 20:06:11 executing program 0: 20:06:11 executing program 4: r0 = epoll_create1(0x0) epoll_create1(0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:12 executing program 2: 20:06:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) [ 351.847116][T13160] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:12 executing program 1: 20:06:12 executing program 0: 20:06:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:12 executing program 2: 20:06:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) 20:06:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr="f700000200"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 20:06:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:12 executing program 4: r0 = epoll_create1(0x0) epoll_create1(0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000780)={0x4000201f}) 20:06:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 352.353380][T13182] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr', 0x3d, 0xd}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 20:06:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x20) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x2, 0xa}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x1, 0x1, 0x400, 0x9, 0x200}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) 20:06:12 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x4000201f}) 20:06:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x0, 0xa}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x1, 0x1, 0x400, 0x9, 0x200}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 352.636535][T13207] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x20) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x2, 0xa}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0x40085112, &(0x7f0000000200)={{0xffffff92}, {0xd0}}) accept$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x0, 0x1, 0x400, 0x9, 0x200, r6}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000400)=0x18) [ 352.961861][T13231] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 353.044242][ T27] audit: type=1400 audit(1582056373.281:61): avc: denied { map } for pid=13226 comm="syz-executor.2" path="/dev/nullb0" dev="devtmpfs" ino=991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 20:06:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x2, 0x8, 0x401, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x8040) 20:06:13 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x4000201f}) 20:06:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 20:06:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x0, 0xa}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x1, 0x1, 0x400, 0x9, 0x200}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) 20:06:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 353.712744][T13257] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:14 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x4000201f}) 20:06:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x20) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x2, 0xa}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0x40085112, &(0x7f0000000200)={{0xffffff92}, {0xd0}}) accept$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x0, 0x1, 0x400, 0x9, 0x200, r6}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000400)=0x18) 20:06:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x0, 0xa}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x1, 0x1, 0x400, 0x9, 0x200}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) 20:06:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x0, 0xa}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x1, 0x1, 0x400, 0x9, 0x200}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) 20:06:14 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) [ 354.519112][T13296] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x20) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x2, 0xa}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0x40085112, &(0x7f0000000200)={{0xffffff92}, {0xd0}}) accept$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x0, 0x1, 0x400, 0x9, 0x200, r6}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000400)=0x18) 20:06:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d}, 0x28) 20:06:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/vcsa#\x00'}}, {@pcr={'pcr'}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x6, &(0x7f0000000040)="fc", 0x20000041) r2 = socket$inet6(0x10, 0x3, 0xc) sendto$inet6(r2, &(0x7f0000000040)="1c000000070a050f0c022000000010c40e000e000400020000000000", 0x1c, 0x0, 0x0, 0x0) r3 = accept4$inet6(r2, 0x0, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x0, @dev}], 0x10) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="ac1e0101ac80a1ab03"], 0x1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000240), 0xb2) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r4, &(0x7f0000000640)="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"/611, 0xffffffffffffff67, 0x40007bd, 0x0, 0xffffffffffffff4f) recvfrom$inet(r4, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x0, 0x0, 0xfffffffffffffd25) 20:06:15 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) 20:06:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57d}, 0x40) [ 354.999122][T13329] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value [ 355.013819][ T27] audit: type=1400 audit(1582056375.251:62): avc: denied { accept } for pid=13325 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:06:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57d}, 0x40) 20:06:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr'}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57d}, 0x40) 20:06:15 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) 20:06:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x57d}, 0x40) [ 355.597658][T13352] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x57d}, 0x40) 20:06:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x57d}, 0x40) 20:06:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:16 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, 0xffffffffffffffff, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x1) epoll_create1(0x80000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x20) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000000)={0x2, 0xa}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 20:06:16 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000018c0)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)) 20:06:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@pcr={'pcr'}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x7, 0x0, &(0x7f0000000380)="a6833c15ce9573", 0x0, 0x57d}, 0x40) 20:06:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 356.166133][T13390] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@pcr={'pcr'}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x7, 0x0, &(0x7f0000000380)="a6833c15ce9573", 0x0, 0x57d}, 0x40) 20:06:16 executing program 4: r0 = socket$inet6(0x11, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4305, 0x2000000, @local}, 0x1c) 20:06:16 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, 0xffffffffffffffff, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x1) epoll_create1(0x80000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x20) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000000)={0x2, 0xa}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) [ 356.471752][T13407] FAT-fs (loop3): Unrecognized mount option "appraise" or missing value 20:06:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x7, 0x0, &(0x7f0000000380)="a6833c15ce9573", 0x0, 0x57d}, 0x40) 20:06:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)={0x34, 0x6, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}}, 0x0) 20:06:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000014c0)='vfat\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@utf8no='utf8=0'}], [{@pcr={'pcr'}}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000180)={0x38, 0x9, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x38}}, 0x0) 20:06:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xb, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1", 0x0, 0x57d}, 0x40) 20:06:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=@flushsa={0x14, 0x1c, 0x1}, 0x14}}, 0x0) 20:06:17 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 20:06:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xb, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1", 0x0, 0x57d}, 0x40) 20:06:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000580)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf02d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd5b74afca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000003c0)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0e268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 20:06:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4002) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000000)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x2000005) pipe(&(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) [ 357.336233][T13439] FAT-fs (loop3): Unrecognized mount option "pcr=00000000000000000000" or missing value 20:06:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:18 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xb, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1", 0x0, 0x57d}, 0x40) 20:06:18 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000300)={@link_local, @broadcast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote}, {0x0, 0x0, 0x8}}}}}, 0x0) 20:06:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000140)="cc03100000130000009d00fc1fa65c1c47c5c37916137d8599b5", 0x1a, 0x0, 0x0, 0x0) 20:06:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:18 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xd, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282", 0x0, 0x57d}, 0x40) 20:06:18 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x2, 0x3, 0x3, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}]}, 0x28}}, 0x0) 20:06:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xa3) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x29}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) 20:06:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:18 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001e00010f"], 0x1}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xd, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282", 0x0, 0x57d}, 0x40) 20:06:18 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:18 executing program 4: pipe(&(0x7f0000000200)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) [ 358.709349][T13511] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.3'. 20:06:19 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8904d5e0ed7cfe2d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xd, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282", 0x0, 0x57d}, 0x40) [ 358.783034][T13524] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.3'. 20:06:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000005b47b4b04fed4e2a21ad8beb06b167de4283ffaec56d159e56a166c9db835a8808a86292f4bea321847a42767a7b89b65e4841c9695825a4b10dd5cb8b24f89f29ceef0a428124dcefb40b6b8ce6222864e92d22b053bda211a0aa613e4d66c8a0490480cbaca2b1216ca5637c028cbe0af4fd21ed36a2ddd56830044f3ead6d80d6f3f39955a2bb6662c29c913e8356d5a58ddb4293241f2ed955ffa0b9"], 0x38}}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000001800)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000440)={0x10001, "65a628b4fc3302727fd61d29d857555f85ec4b41b3155d094dab90801b23d70c", 0x3, 0x1, 0xfffffffc, 0xb700, 0x2}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB='D\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="00000000000000000800f1ff0800010075333200180002001400050000000000000000000000000000000400"], 0x44}}, 0x0) socket(0x1000000010, 0x80002, 0x0) 20:06:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) semget(0x3, 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x0, 0xa}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x800, 0x1, 0x1, 0x400, 0x9, 0x200}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) 20:06:19 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) shmget(0x2, 0x1000, 0x1c, &(0x7f0000bf8000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x5) syz_open_dev$admmidi(0x0, 0x8, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000200)='NLBL_UNLBL\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x802000004, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001340)='cpuset.effective_mems\x00', 0x275a, 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000140)={0x0, 0x9, 0x101, &(0x7f0000000100)=0x2f}) socketpair$unix(0x1, 0x55c072a5735e3121, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x0, 0x18000) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INFO(r4, 0x84, 0x80, 0x0, &(0x7f0000000100)) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INFO(r5, 0x84, 0x80, 0x0, &(0x7f0000000100)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001340)='cpuset.effective_mems\x00', 0x275a, 0x0) fallocate(r6, 0x0, 0x0, 0x110001) ppoll(&(0x7f0000000440)=[{r3, 0x8040}, {r4}, {}, {r5}, {}, {r6}, {}], 0x7, &(0x7f0000000480)={0x0, 0x1c9c380}, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000380)={0x2, 'batadv0\x00', 0x1}, 0x18) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000240)={0x7f, 0x7f, 0x6}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003440)={'netdevsim0\x00'}) r7 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r8 = dup(0xffffffffffffffff) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="ab0d000000", @ANYRES32=r9, @ANYBLOB="00000000000000000c0001000000000000000000"], 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003480)={'team0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="2c24004701000000000004000054", @ANYRES32=r12, @ANYBLOB="00000000000000d5f7456b5adb46a9b67c0d89f9a3c0a54f85ba9bb3a14de3b460c82ce00c856bf3d31fd288caa1b2b0dab0a88bc3eb3269a01c33a103766f0f48b225d38948c9c8c148fa2b01237d160946966822450436cea6c3c03cba48a9fff85210903f390c69de9958035e92df428b89ad41497106fc92b4d354e6235608b5d0122c1488a38e9b3924"], 0x2c}}, 0x0) socket(0x10, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000039c0)={@rand_addr, @remote}, &(0x7f0000003a00)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r13) r14 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) read$snddsp(r14, 0x0, 0x0) r15 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) read$snddsp(r15, 0x0, 0x0) r16 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) dup3(r16, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, r16, 0x0, 0xc48fc42a5d8070ee, &(0x7f0000000a00)='bond_slave_0\x00\x16\x9c\xe9\xf6s\xc5\xa85$\xd6\x80\xd6\x92\xc5\xc9qu\x83x\xbdKW\xa7\xad\xfa%\x1f\xf4\x15\xa9O\xab\x8a\x96\xa1\x18 )\xda\xa1\xe6y\xb6\x18\x8dM\xe9\xac)]\xba\xb3\xf9\x14\x83\xa1\"\x0f\x95L\x98Ol\xca\x02E\xb3\xa9\x03P\xf6#s0B\xbb|Zx\xecQ\xcf\xb0/n\xc8\x87\x03\'\x10\x96\xbd\x96\xc2A\xe2\x14\xb7G\vd\xdb\xc0\\ \xc1`\x8d\xc4\xca(\xa7\xf1~DL\xce\xac8\x18\\\x8f\xc0rf\xed\xdaeA\x10})e\x19\x93\xf8\xa7\xdcb\x1c\x856'}, 0x30) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r16, &(0x7f0000000240)="90cfdb13ccb65d507dcb8c264a75117ad1f11ce92c373945e27c5c042a540e843ae3d30bc826a0c4eddfdedca9c0be99794ecb8cf3e88ec9bc4b6597ad8747c79a785703603b5d92e84b40aab79a531ebda3ab593445658dd8a9d08741e7230d9f26c0dc57688149621d5b1814b5bf174daa93b53deb6b4394c908f834d3d601e4137e483115543b52375d28688630c8bc37931d8c1d836d9711d72a24b83bde64b945be7b462c4cecdacc8e4f3379b6d2edf72386bc6e37629ddc24961c938ff6c894e3fac674acdcbf777a6b0191e0d186a91d315363619e9b52777b8ddf470ab2a799045756acb69d48a7324bbf7fedbd13", &(0x7f0000000340)=""/149}, 0x20) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32, @ANYBLOB="00e6ffffff00000008001c00", @ANYRES32=r16, @ANYBLOB="8fbe6adc570e203f4033bfe23deffacb9df3a2b4e4058a0eef5c2d0922ac0600f00ecdb2b756ccb2de1c29efebc72e274e26feeeef99257f976d0362fcb54a8aa66af19c18fc1f668fba37320a04a73070ce7b6a291a1b86416dda6b9800ddffffff00000000000000"], 0x5}}, 0x0) dup(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 20:06:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x0) 20:06:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0}, 0x40) [ 359.402913][T13555] IPVS: sync thread started: state = BACKUP, mcast_ifn = batadv0, syncid = 1, id = 0 [ 359.441000][T13553] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65280 sclass=netlink_route_socket pid=13553 comm=syz-executor.4 20:06:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:19 executing program 3: syz_emit_ethernet(0x16, &(0x7f0000000000)={@random="1c118879d3cf", @broadcast}, 0x0) syz_emit_ethernet(0x12, &(0x7f0000000040)={@dev, @remote, @val={@void}}, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000001780)=ANY=[@ANYBLOB="ffffffffffcc8f8ba200000086dd60dc9ae700283a001bfffaa7c4987f6a2e7b5f0bc485b703ff0200000000000000000000000000018900907a00000000fe880000000000000000000000000001fe8000000000000000000000000000aa"], 0x0) syz_emit_ethernet(0x56, &(0x7f0000000180)={@local, @dev, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "4fef7c", 0x20, 0x6, 0x0, @remote, @rand_addr="ed876789b2149d6f4841ccd82210e5b0", {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 20:06:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x0) 20:06:19 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 20:06:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0}, 0x40) 20:06:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='4', 0x1, 0x50, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="4ce8b00ab9a6d2456186befaddf08b03"}, 0x1c) 20:06:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x0) 20:06:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0}, 0x40) [ 359.886620][T13575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65280 sclass=netlink_route_socket pid=13575 comm=syz-executor.4 20:06:20 executing program 3: 20:06:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000640)='memory.stat\x00', 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000700)='cpuset.cpus\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={0x0}, 0x10) write$cgroup_int(r3, &(0x7f00000003c0), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20008840) close(r5) r6 = perf_event_open$cgroup(&(0x7f0000000900)={0x5, 0x70, 0x5, 0x4, 0x3f, 0x80, 0x0, 0xc74f, 0x9040, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000008c0), 0x8}, 0x400, 0x4c35b46a, 0xfffffffb, 0x9, 0x1, 0x1, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000980)='./cgroup.cpu/syz0\x00') perf_event_open$cgroup(0x0, r2, 0xb, r4, 0xa) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup(r7, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_type(r8, 0x0, 0xf800000000000000) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000880)={0x0, 0x0}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b00)={r2, 0x12, 0x1, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) write$cgroup_int(r3, &(0x7f0000000040)=0x7fffffff, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0xe, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000000000000000000000000200850000002c0000009508000000000000ee978b4b1f6e1584a6c6f87889434aea67032778a9a6350c7cfbb8ed65b603b177598b46ce57ff0f15f8721170c605f871f1e6939fed2072faaa7907d8b4c97149807d18446acbcf10fb2ada88380000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r9, 0x0, 0xbb, 0x0, &(0x7f0000000e00)="02012e9877d2b666cd783f4b231c9e3a73e97277af64b3855184687202e1545273ba6169229476584e4689b8e72227dc0b0cd9f5d3305572f74cbdb139396840afd136319d3549cf7d30449f33f2c3e2dacce6a0c2f348ec32a018fc6c29a2d51148efbd9ce84c1441c94309316666a0dad3834ac730d03c2316c7e1c39a839d0c11673fa5ce9ddae72b9c30d727da212d7465898ca5712134c9525697f63cb54ba95d67c04b57a16af4089834b2f4a5d6f1b9efad93774c2361a0", 0x0, 0x3, 0x0, 0x48, 0x0, &(0x7f0000000680)="98c44bdacc2e1d038279fd173bfc7421e93d0d56def3d6ecd94e658c9123a2800a0f2ab211508dda57c39d4256c3e1920150c4dab4eb09bff601eb4d2da0aada314652f6e228ca57"}, 0x40) socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="b702000003000000bfa3000000000703000000feffff7a0af0fff8ffffff79a4f0fd00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c038bbadeaf4276847e3d5d78c07f34e4d5b318e2ec0efd49897a74a0091ff110026e6d2ef831ab7ea0524f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04bac9882d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a07000000b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29ad2cc5f1e5dad9796edb697a6ea0182babc18cae2ed4b439f9a9ceafd07ed00b0000002cab154ad029a119ca3c972780870014601c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f3439501aafe234870072858dc06e7c3376a310631dfa0aa6899d9f6a5a74f4100242d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db0e02377d9defd1a46939868529736e27d11bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8fc51ba5da067e06eb90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d0000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xec, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008001bffffff00004000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a", 0x0, 0xfe, 0x60000000}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x800, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x4, 0x3}, 0x0, 0x0, &(0x7f00000002c0)={0x1, 0xb, 0x0, 0x401}, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007340)={0x16, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x800, 0x8, &(0x7f00000007c0)=""/8, 0x20880, 0x5, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f00000072c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000007300)={0x2, 0x0, 0x0, 0x4}, 0x10}, 0x78) recvmsg(r10, &(0x7f0000007200)={&(0x7f0000006c40)=@can, 0x80, &(0x7f0000007080)=[{&(0x7f0000006cc0)=""/55, 0x37}, {0x0}, {&(0x7f0000006d80)=""/149, 0x95}, {0x0}, {&(0x7f0000006e80)=""/254, 0xfe}, {0x0}], 0x6, &(0x7f0000007100)=""/220, 0xdc}, 0x10004) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x50, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='io.bfq.weight\x00', 0x2, 0x0) 20:06:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x0, 0x0, 0x0}, 0x40) 20:06:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x24041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1e, &(0x7f0000000040)=r0, 0x52d) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:06:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 20:06:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x0, 0x0, 0x0}, 0x40) 20:06:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x24041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1e, &(0x7f0000000040)=r0, 0x52d) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:06:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 20:06:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 20:06:20 executing program 3: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000440)=0x40000) close(r0) 20:06:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 20:06:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x0, 0x0, 0x0}, 0x40) 20:06:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, 0x2, 0x3, 0x3, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8}]}, 0x2c}}, 0x0) 20:06:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 20:06:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 20:06:21 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:21 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @dev}}}}}, 0x0) 20:06:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 20:06:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 20:06:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 20:06:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x19, &(0x7f0000000000)={0x1}, 0x8) 20:06:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000acbdff7a8b455235f877c46fb88194f2b1b185e5a2e303855811a00d481d33b48a29825eefab888236677c3547c8bf2c0931b900d2de57fa12c6f09b3b52bd35122da8718bd9ed9766a5438cac10e0d7ef68ec091f97795f45e03df9c28fcf4c48ea2b51ff9248cccbf397367cb60cdd097c5bcc80849a1ba58e5c57994852ea31773f189d8d6955d8dc70170c23fdf6b9446f41412f28a661eeed021610d2725b9808fa80e1890ca0003573abde02014533e140620271d89c221f02bd8c530480a15755cfa9d793f49c94de4b03c2d5be5067bc20519e8212c6e3afd042e70338f5a534764a936cb7d6a1218b3281e2c69b947dec48545424470f09216af166e7fa28aa932a8c777c2aea8c97c5c6d9be5a6c87cd385d067a5c1a7ccc99c031f9cd2db700a2e3071af484e12e51593141189f373ffd76a1233e695dfd9022aeda612a1948731c59074d667834304cdf909e472c5753b8ad4eb6525f30effc4207c33a394abe6bcfa19a5293b4d791342d05b660e140a6074584c14ba47e2ab2a118bc3be0f1d5a7c331dafdbc5cd08827504b5f3be697ef9716b03e267a"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xbaae9238b0c1f6c9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 20:06:22 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 20:06:22 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:22 executing program 4: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000180)="bebe", 0x2, 0x2008004, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 20:06:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f00000001c0)=""/246, 0x2e, 0xf6, 0x1}, 0x20) 20:06:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:22 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:22 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x30, 0x3, 0x8, 0x401, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_SYN_SENT={0x8}]}]}, 0x30}}, 0x0) 20:06:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:22 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x4, &(0x7f0000003300), 0x4) 20:06:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:22 executing program 4: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0xfffd, 0x0, 0x0, 0x141}, 0x9c) 20:06:22 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:06:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 20:06:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket$inet(0x2, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r0, &(0x7f0000000040)="9e", 0x1, 0x0, 0x0, 0x0) 20:06:23 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000), &(0x7f0000000040)=0x8) 20:06:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x8904d5e0ed7cfe2d}, 0x14}}, 0x0) 20:06:23 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75}, 0xe) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1a0f0, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 20:06:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x5cc}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) recvfrom$inet6(r0, 0x0, 0xfffffd66, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 363.425926][T13762] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 363.466040][T13762] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:23 executing program 4: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x34, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}]}]}, 0x34}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x20, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x20}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001d0001410000001def000c0001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x8904d5e0ed7cfe2d}, 0x14}}, 0x0) 20:06:23 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 363.501648][T13762] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 363.532994][T13762] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x8904d5e0ed7cfe2d}, 0x14}}, 0x0) [ 363.612774][T13765] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 20:06:23 executing program 5: syz_emit_ethernet(0x92, &(0x7f0000000080)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "f45d58", 0x5c, 0x2f, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[@dstopts={0x0, 0x1, [], [@calipso={0x7, 0x8}]}]}}}}}, 0x0) [ 363.661662][T13765] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.1'. [ 363.671770][T13781] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 20:06:23 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:24 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 363.751926][T13781] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. [ 363.755003][T13769] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 363.837051][T13789] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 363.858357][T13769] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.1'. [ 363.868097][T13789] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. 20:06:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x18}, [@ldst={0x6, 0x5, 0x6, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 20:06:24 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 363.900131][T13762] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 363.928990][T13762] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000180), 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000300)=@gcm_256={{0x304}, "d9dc7fc0ba0af532", "ce9cca46fdeec3557ddd8e27fdd6b1b699c9a86553f1f7acaf441d27a3e6e2c6", "695de11a", "eecd446eafb86624"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 363.975117][T13762] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 363.994933][T13762] netlink: 636 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:24 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x2c) sendto$inet6(r0, &(0x7f0000000100)="ff000007214d56d0", 0x8, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 20:06:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087bd, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r0, &(0x7f0000000000)='\f', 0xfb386d1f6a4fd57d, 0x400800a, 0x0, 0xae19fea218018fd) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffe6a, 0x700, 0x0, 0xb84608a41099d4b8) 20:06:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2a}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x64}}, 0x0) 20:06:24 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 364.223884][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 364.345918][ T27] audit: type=1400 audit(1582056384.581:63): avc: denied { map } for pid=13804 comm="syz-executor.4" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=49982 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 20:06:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x6, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:06:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000b00)='nv\x00', 0x3) sendto$inet(r0, 0x0, 0x0, 0x240087bd, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 20:06:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000007d562ecf58e7e94151b12921b8c5a1e9fd42dd90a5febedb1f8aacc1b243e7252bb136de5338d9cec1a94344c425dbd11b97b20141e8d6a6879d0874a35526511f1e1745161c8c98cde723fdb30f2891dd8987b0b37691b9dcac1fae58569a3a3c52a7161b9d1c15a5d4bb0109676bab7a751001d2e4b530e23f0988c7a9a1feb77bf"], &(0x7f0000000080)='GPL\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:06:24 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x7ffffff7, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="4ce5ca6eceacf6102cf8dbf758ace757"}, 0x1c) 20:06:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0xfffffffe}]}}, &(0x7f0000000340)=""/142, 0x26, 0x8e, 0x1}, 0x20) 20:06:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x101, 0x0, 0x0, {0xa}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x2}]}], {0x14}}, 0x60}}, 0x0) 20:06:25 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:25 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:25 executing program 4: [ 365.055514][T13863] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 365.063899][T13863] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. [ 365.079046][T13865] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 365.087805][T13865] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:25 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:25 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:25 executing program 5: 20:06:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x48, 0x65}, [@ldst={0x7, 0x1}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffea2}, 0x48) [ 365.328313][T13875] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:26 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x10}, [@ldst], {0x95, 0x8}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe0c, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 20:06:26 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) [ 365.862296][T13898] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:26 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:26 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1b0100001a001f0f", 0x8, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)="1b", 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:26 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:26 executing program 4: 20:06:26 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 366.117796][T13913] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:26 executing program 4: 20:06:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:26 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:26 executing program 5: 20:06:26 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:26 executing program 4: 20:06:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:27 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:27 executing program 4: 20:06:27 executing program 5: 20:06:27 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:27 executing program 5: 20:06:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:27 executing program 4: 20:06:28 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:28 executing program 5: 20:06:28 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:28 executing program 4: 20:06:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:29 executing program 5: 20:06:29 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:29 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:29 executing program 4: 20:06:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:29 executing program 4: 20:06:29 executing program 5: 20:06:29 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:29 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:29 executing program 4: 20:06:29 executing program 5: 20:06:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000280), 0x4) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:31 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:31 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:31 executing program 4: 20:06:31 executing program 5: 20:06:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:31 executing program 4: [ 371.066541][T14034] netlink: 49 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:31 executing program 5: 20:06:31 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:31 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:31 executing program 4: 20:06:31 executing program 5: [ 371.381452][T14048] netlink: 49 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000280), 0x4) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:32 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:32 executing program 4: 20:06:32 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001c00010f1f0a140000001100020071f901000000800180e90c0001"], 0x1}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:32 executing program 5: 20:06:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:32 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 372.675664][T14069] netlink: 49 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:33 executing program 5: 20:06:33 executing program 4: 20:06:33 executing program 1: sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:33 executing program 4: 20:06:33 executing program 5: [ 373.081746][T14085] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000000280), 0x4) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:34 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:34 executing program 1: sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:34 executing program 5: 20:06:34 executing program 4: 20:06:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:34 executing program 1: sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 374.354641][T14103] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:34 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:34 executing program 5: [ 374.429422][T14107] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:34 executing program 4: 20:06:34 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:34 executing program 5: [ 374.604994][T14114] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:36 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:36 executing program 4: 20:06:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:36 executing program 5: 20:06:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 376.007442][T14136] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:36 executing program 5: 20:06:36 executing program 4: 20:06:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:36 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 376.392707][T14153] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:38 executing program 4: 20:06:38 executing program 5: 20:06:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:38 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:38 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:38 executing program 5: [ 377.842378][T14175] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:38 executing program 4: 20:06:38 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:38 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:38 executing program 4: [ 378.156043][T14187] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)='\n', 0xfffffdef, 0x40080, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000240)="1a7b1a1acbf9549b15f558bcabce", 0xe, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet6(0x10, 0x3, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) 20:06:39 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r0, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, &(0x7f0000000000)={0x1, 0x0, {0x0, 0xa9e4, 0x8, 0x68}}) 20:06:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:39 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:39 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 379.187017][T14208] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:39 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="1d00000018001ffd00489b0d1b849add020268", 0x13, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="c00000005101190500000600000000000a0000003c0001002c0001001400030016f8bad33edad6b8000000000000000014000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c00010014000300fe88000000000000000000000000000114000400ff01000000000000000000000000000108e006"], 0x1}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280001001800ef030005000263300a411d01"], 0x1}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x4000, 0x0, 0x4b6ae4f95a5de35b) 20:06:39 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:39 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040), 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 379.614844][T14225] netlink: 8113 bytes leftover after parsing attributes in process `syz-executor.4'. 20:06:39 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 379.684022][T14228] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:41 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000140)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb7c, "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"}, &(0x7f0000001240)=0xb84) 20:06:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040), 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:41 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)='\n', 0xfffffdef, 0x40080, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000240)="1a7b1a1acbf9549b15f558bcabce", 0xe, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet6(0x10, 0x3, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) [ 381.102104][T14252] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040), 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:41 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:41 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x2, 0x1, 0x0, [@mcast1]}, 0x18) 20:06:41 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 381.647965][T14276] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) dup(r0) chdir(&(0x7f0000000180)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x90af) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005bc0)={@mcast1}, 0x14) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r2, 0x0, 0x2000000, 0x4) 20:06:43 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[]}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000005200018889441f42fddc30b1020018a6984a00000000000000000000ffffac1e0001ac1414bb00000000000d000000000000000000010000000000000000000000000e9b374f29999e69f501cefb1d1fe73afb33c0652a38e202ae861726a48d31e68725771cdcc54c5989a464a588ae786a3cf8b136be16b07b9301cb23e15afca56b57c6bb859e72e1ff98e56c1953c61f76592ae64c932b5026d12800215c80a6eeb512265ea859931fe6abb750a3e700f6aafd44c9ecb9be4107ad8f267f7b1df2c4336d6a8297d748a0d7e9453604cdd485ab97a580ae31d6de7ec062907c7765999d2728f861036300", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ff00000000000000ac1414aa00"/176], 0xf8}}, 0x0) 20:06:43 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 20:06:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:43 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @multicast2}, 0x10) 20:06:43 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, 0x0, 0x0) [ 383.488410][T14297] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:43 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, 0x0, 0x0) 20:06:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 20:06:43 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, 0x0, 0x0) 20:06:43 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[]}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0xffffff7f}]}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001a000161f2ff14000678290001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:06:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x6c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x40, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'geneve1\x00'}, {0x14, 0x1, 'gre0\x00'}]}]}]}], {0x14, 0x10}}, 0xb4}}, 0x0) [ 383.861929][T14316] general protection fault, probably for non-canonical address 0xdffffc00060cae4d: 0000 [#1] PREEMPT SMP KASAN [ 383.873688][T14316] KASAN: probably user-memory-access in range [0x0000000030657268-0x000000003065726f] [ 383.883241][T14316] CPU: 1 PID: 14316 Comm: syz-executor.5 Not tainted 5.6.0-rc2-syzkaller #0 [ 383.891917][T14316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.902922][T14316] RIP: 0010:nf_flow_table_offload_setup+0x4dc/0x6d0 [ 383.909530][T14316] Code: bc 24 50 ff ff ff 48 ba 00 00 00 00 00 fc ff df 4d 8b ae 00 02 00 00 4d 8b a4 24 58 ff ff ff 49 8d 7f 08 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 cd 01 00 00 4c 89 e2 49 89 47 08 48 b8 00 00 00 [ 383.929147][T14316] RSP: 0018:ffffc9000597f228 EFLAGS: 00010207 [ 383.935267][T14316] RAX: ffff888093912a50 RBX: 1ffff92000b2fe49 RCX: 00000000060cae4d [ 383.943768][T14316] RDX: dffffc0000000000 RSI: ffffffff8687894e RDI: 000000003065726f [ 383.951782][T14316] RBP: ffffc9000597f370 R08: ffff88804a91a100 R09: fffff52000b2fe55 [ 383.959912][T14316] R10: fffff52000b2fe54 R11: ffffc9000597f2a6 R12: 0000000000000000 [ 383.968848][T14316] R13: ffff888093912a50 R14: ffff888093912850 R15: 0000000030657267 [ 383.977912][T14316] FS: 00007f52ffb05700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 383.986843][T14316] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 383.993736][T14316] CR2: 0000000000748000 CR3: 00000000a91a9000 CR4: 00000000001406e0 [ 384.006087][T14316] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 384.014138][T14316] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 384.022102][T14316] Call Trace: [ 384.025392][T14316] ? flow_offload_queue_work+0x130/0x130 [ 384.031062][T14316] ? nft_netdev_hook_alloc+0xfb/0x170 [ 384.036768][T14316] ? nf_tables_init_net+0x1e0/0x1e0 [ 384.042029][T14316] ? nla_memcpy+0xb0/0xb0 [ 384.046417][T14316] ? wait_for_completion+0x440/0x440 [ 384.051692][T14316] ? nf_tables_parse_netdev_hooks+0x70/0x660 [ 384.057757][T14316] nf_tables_newflowtable+0x1352/0x1d90 [ 384.063308][T14316] ? nf_tables_newrule+0x2400/0x2400 [ 384.068686][T14316] ? __nla_parse+0x43/0x60 [ 384.073168][T14316] nfnetlink_rcv_batch+0x8c8/0x1790 [ 384.078355][T14316] ? nf_tables_newrule+0x2400/0x2400 [ 384.083638][T14316] ? nfnetlink_subsys_register+0x2b0/0x2b0 [ 384.089478][T14316] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 384.095141][T14316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.101369][T14316] ? __nla_validate_parse+0x2d0/0x1ee0 [ 384.106813][T14316] ? selinux_capable+0x36/0x40 [ 384.111563][T14316] ? nla_memcpy+0xb0/0xb0 [ 384.115878][T14316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.122182][T14316] ? ns_capable_common+0x93/0x100 [ 384.127204][T14316] ? __nla_parse+0x43/0x60 [ 384.131604][T14316] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 384.137833][T14316] nfnetlink_rcv+0x3e7/0x460 [ 384.142520][T14316] ? nfnetlink_rcv_batch+0x1790/0x1790 [ 384.148046][T14316] ? netlink_deliver_tap+0x248/0xbf0 [ 384.153323][T14316] netlink_unicast+0x59e/0x7e0 [ 384.158091][T14316] ? netlink_attachskb+0x870/0x870 [ 384.163210][T14316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.169460][T14316] netlink_sendmsg+0x91c/0xea0 [ 384.174382][T14316] ? netlink_unicast+0x7e0/0x7e0 [ 384.180171][T14316] ? tomoyo_socket_sendmsg+0x26/0x30 [ 384.185464][T14316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.192006][T14316] ? security_socket_sendmsg+0x8d/0xc0 [ 384.197467][T14316] ? netlink_unicast+0x7e0/0x7e0 [ 384.202464][T14316] sock_sendmsg+0xd7/0x130 [ 384.206884][T14316] ____sys_sendmsg+0x753/0x880 [ 384.211658][T14316] ? kernel_sendmsg+0x50/0x50 [ 384.216354][T14316] ? __fget_files+0x337/0x520 [ 384.221141][T14316] ? find_held_lock+0x35/0x130 [ 384.225901][T14316] ___sys_sendmsg+0x100/0x170 [ 384.230593][T14316] ? sendmsg_copy_msghdr+0x70/0x70 [ 384.235758][T14316] ? __kasan_check_read+0x11/0x20 [ 384.240787][T14316] ? __fget_files+0x359/0x520 [ 384.245465][T14316] ? ksys_dup3+0x3e0/0x3e0 [ 384.249892][T14316] ? __fget_light+0x1ad/0x270 [ 384.254678][T14316] ? __fdget+0x1b/0x20 [ 384.258737][T14316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.265491][T14316] __sys_sendmsg+0x105/0x1d0 [ 384.270099][T14316] ? __sys_sendmsg_sock+0xc0/0xc0 [ 384.275203][T14316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 384.280653][T14316] ? do_syscall_64+0x26/0x790 [ 384.285354][T14316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.292375][T14316] ? do_syscall_64+0x26/0x790 [ 384.297056][T14316] __x64_sys_sendmsg+0x78/0xb0 [ 384.301815][T14316] do_syscall_64+0xfa/0x790 [ 384.306324][T14316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.312214][T14316] RIP: 0033:0x45c449 [ 384.316111][T14316] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 384.336141][T14316] RSP: 002b:00007f52ffb04c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 384.344539][T14316] RAX: ffffffffffffffda RBX: 00007f52ffb056d4 RCX: 000000000045c449 [ 384.352506][T14316] RDX: 0000000000000000 RSI: 0000000020003e00 RDI: 0000000000000003 [ 384.360479][T14316] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 384.368561][T14316] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 384.376796][T14316] R13: 0000000000000947 R14: 00000000004cbb2d R15: 000000000076bf2c [ 384.385555][T14316] Modules linked in: [ 384.405987][T14318] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.1'. [ 384.417013][T14316] ---[ end trace 9ca24ccfd4810b0f ]--- [ 384.422731][T14316] RIP: 0010:nf_flow_table_offload_setup+0x4dc/0x6d0 [ 384.429477][T14316] Code: bc 24 50 ff ff ff 48 ba 00 00 00 00 00 fc ff df 4d 8b ae 00 02 00 00 4d 8b a4 24 58 ff ff ff 49 8d 7f 08 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 cd 01 00 00 4c 89 e2 49 89 47 08 48 b8 00 00 00 [ 384.494744][T14316] RSP: 0018:ffffc9000597f228 EFLAGS: 00010207 [ 384.512368][T14316] RAX: ffff888093912a50 RBX: 1ffff92000b2fe49 RCX: 00000000060cae4d [ 384.562311][T14316] RDX: dffffc0000000000 RSI: ffffffff8687894e RDI: 000000003065726f [ 384.570603][T14316] RBP: ffffc9000597f370 R08: ffff88804a91a100 R09: fffff52000b2fe55 [ 384.579083][T14316] R10: fffff52000b2fe54 R11: ffffc9000597f2a6 R12: 0000000000000000 [ 384.588015][T14316] R13: ffff888093912a50 R14: ffff888093912850 R15: 0000000030657267 [ 384.605159][T14316] FS: 00007f52ffb05700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 384.617233][T14316] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 384.624647][T14316] CR2: 00007fff221af090 CR3: 00000000a91a9000 CR4: 00000000001406f0 [ 384.633019][T14316] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 384.652094][T14316] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 384.673027][T14316] Kernel panic - not syncing: Fatal exception [ 384.680624][T14316] Kernel Offset: disabled [ 384.684952][T14316] Rebooting in 86400 seconds..